Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1obTkyLXZnbXctcWZteM4AA3Ah
chromedriver Command Injection vulnerability
Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system.
Note:
An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
Permalink: https://github.com/advisories/GHSA-hm92-vgmw-qfmxJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1obTkyLXZnbXctcWZteM4AA3Ah
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 19 days ago
Updated: 11 days ago
CVSS Score: 5.6
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Identifiers: GHSA-hm92-vgmw-qfmx, CVE-2023-26156
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-26156
- https://github.com/giggio/node-chromedriver/commit/de961e34e023afcf4fa5c0faeeec69aaa6c3c815
- https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
- https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539
- https://github.com/advisories/GHSA-hm92-vgmw-qfmx
Affected Packages
npm:chromedriver
Versions: < 119.0.1Fixed in: 119.0.1