GHSA-7p6h-3fmw-539q

Suggest an improvement
Source
https://github.com/advisories/GHSA-7p6h-3fmw-539q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-7p6h-3fmw-539q/GHSA-7p6h-3fmw-539q.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7p6h-3fmw-539q
Aliases
  • CVE-2016-10624
Published
2019-02-18T23:47:27Z
Modified
2023-11-08T03:58:16.542637Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
selenium-chromedriver Downloads Resources over HTTP
Details

Affected versions of selenium-chromedriver insecurely download an executable over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running selenium-chromedriver.

Recommendation

No patch is currently available for this vulnerability, and the author has marked the package as deprecated.

The best mitigation is currently to avoid using this package, using a different package if available.

Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo

Database specific
{
    "github_reviewed_at": "2020-06-16T21:23:02Z",
    "cwe_ids": [
        "CWE-311"
    ],
    "nvd_published_at": null,
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / selenium-chromedriver

Package

Name
selenium-chromedriver
View open source insights on deps.dev
Purl
pkg:npm/selenium-chromedriver

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.0.2