Vulnerability Description
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scrapy | Scrapy | < 2.11.1 |
Related Weaknesses (CWE)
References
- https://github.com/scrapy/scrapy/commit/479619b340f197a8f24c5db45bc068fb8755f2c5Patch
- https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26bExploitIssue TrackingPatch
- https://github.com/scrapy/scrapy/commit/479619b340f197a8f24c5db45bc068fb8755f2c5Patch
- https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26bExploitIssue TrackingPatch
FAQ
What is CVE-2024-1892?
CVE-2024-1892 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML conte...
How severe is CVE-2024-1892?
CVE-2024-1892 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1892?
Check the references section above for vendor advisories and patch information. Affected products include: Scrapy Scrapy.