Description
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.
References (3)
Core 3
Core References
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585
Patch, Third Party Advisory x_refsource_misc
https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html
Scores
CVSS v3
6.5
EPSS
0.0021
EPSS Percentile
43.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
CWE-863
Status
published
Products (3)
debian/debian_linux
9.0
pypi/scrapy
0 - 1.8.2PyPI
scrapy/scrapy
< 2.6.1
Published
Mar 02, 2022
Tracked Since
Feb 18, 2026