CVE-2016-10573

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10573
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10573.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-10573
Aliases
Published
2018-05-29T20:29:01Z
Modified
2024-09-03T01:04:24.239547Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

baryton-saxophone is a module to install and launch Selenium Server for Mac, Linux and Windows. baryton-saxophone versions below 3.0.1 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.

References

Affected packages

Git / github.com/tobli/baryton-saxophone

Affected ranges

Type
GIT
Repo
https://github.com/tobli/baryton-saxophone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.50.1
v2.53.0