
Cloud Vulnerability DB
A community-led vulnerabilities database
The scrapy/scrapy project was identified with a vulnerability (CVE-2024-3572) related to XML External Entity (XXE) attacks. The vulnerability was discovered due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This security issue was disclosed on April 15, 2024 (NVD, CVE).
The vulnerability received a CVSS v3.0 base score of 7.5 (HIGH) with the vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The issue is associated with CWE-409 (Improper Handling of Highly Compressed Data), indicating potential data amplification concerns. The core issue lies in the unsafe parsing of untrusted XML data using lxml.etree.fromstring without implementing proper validation mechanisms (NVD).
The vulnerability enables attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data. This poses significant risks to systems implementing the affected scrapy versions (NVD).
A fix has been implemented and is available in the scrapy repository. Users are advised to update to the patched version as detailed in the commit (Github Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."