Home » Database

AVID-2026-R0887

Description

Splash authentication credentials potentially leaked to target websites in scrapy-splash (CVE-2021-41124)

Details

Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use HttpAuthMiddleware (i.e. the http_user and http_pass spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes robots.txt requests sent by Scrapy when the ROBOTSTXT_OBEY setting is set to True. Upgrade to scrapy-splash 0.8.0 and use the new SPLASH_USER and SPLASH_PASS settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, using the splash_headers request parameter, instead of defining them globally using the HttpAuthMiddleware. Alternatively, make sure all your requests go through Splash. That includes disabling the robots.txt middleware.

Reason for inclusion in AVID: CVE-2021-41124 describes a credential leakage vulnerability in Scrapy-Splash when using HttpAuthMiddleware, exposing authentication data to target websites. Scrapy-Splash is a library used in data collection pipelines, which can be part of AI data ingestions and general-purpose AI system workflows. This constitutes a software supply-chain vulnerability in components that could be used to build AI systems (data harvesting/processing stacks). The vulnerability is clearly security-related (credential exposure) with actionable mitigations.

References

Affected or Relevant Artifacts

  • Developer: scrapy-plugins
  • Deployer: scrapy-plugins
  • Artifact Details:
TypeName
Systemscrapy-splash

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Base Score7.4
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-200CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-10-05
  • Version: 0.3.3
  • AVID Entry