Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1obTkyLXZnbXctcWZteM4AA3Ah

chromedriver Command Injection vulnerability

Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system.

Note:

An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.

Permalink: https://github.com/advisories/GHSA-hm92-vgmw-qfmx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1obTkyLXZnbXctcWZteM4AA3Ah
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 5.6
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

EPSS Percentage: 0.00202
EPSS Percentile: 0.58774

Identifiers: GHSA-hm92-vgmw-qfmx, CVE-2023-26156
References: Repository: https://github.com/giggio/node-chromedriver
Blast Radius: 26.4

Affected Packages

npm:chromedriver
Dependent packages: 4,158
Dependent repositories: 50,928
Downloads: 2,906,836 last month
Affected Version Ranges: < 119.0.1
Fixed in: 119.0.1
All affected versions: 2.0.0, 2.0.1, 2.2.0, 2.3.0, 2.6.0, 2.8.0, 2.8.1, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.14.1, 2.15.0, 2.15.1, 2.15.2, 2.16.0, 2.18.0, 2.19.0, 2.20.0, 2.21.0, 2.21.1, 2.21.2, 2.22.0, 2.22.1, 2.22.2, 2.23.0, 2.23.1, 2.24.0, 2.24.1, 2.25.0, 2.25.1, 2.25.2, 2.25.3, 2.26.0, 2.26.1, 2.26.2, 2.27.0, 2.27.1, 2.27.2, 2.27.3, 2.28.0, 2.29.0, 2.29.1, 2.29.2, 2.30.0, 2.30.1, 2.31.0, 2.32.0, 2.32.1, 2.32.2, 2.32.3, 2.33.0, 2.33.1, 2.33.2, 2.34.0, 2.34.1, 2.35.0, 2.36.0, 2.37.0, 2.38.0, 2.38.1, 2.38.2, 2.38.3, 2.39.0, 2.40.0, 2.41.0, 2.42.0, 2.42.1, 2.43.0, 2.43.1, 2.43.2, 2.43.3, 2.43.4, 2.44.0, 2.44.1, 2.45.0, 2.46.0, 73.0.0, 74.0.0, 75.0.0, 75.0.1, 75.1.0, 76.0.0, 76.0.1, 77.0.0, 78.0.0, 78.0.1, 79.0.0, 79.0.1, 79.0.2, 79.0.3, 80.0.0, 80.0.1, 80.0.2, 81.0.0, 83.0.0, 83.0.1, 84.0.0, 84.0.1, 85.0.0, 85.0.1, 86.0.0, 87.0.0, 87.0.1, 87.0.2, 87.0.3, 87.0.4, 87.0.5, 87.0.6, 87.0.7, 88.0.0, 89.0.0, 90.0.0, 90.0.1, 91.0.0, 91.0.1, 92.0.0, 92.0.1, 92.0.2, 93.0.0, 93.0.1, 94.0.0, 95.0.0, 96.0.0, 97.0.0, 97.0.1, 97.0.2, 97.0.3, 97.0.4, 98.0.0, 98.0.1, 99.0.0, 100.0.0, 101.0.0, 102.0.0, 103.0.0, 104.0.0, 105.0.0, 105.0.1, 106.0.0, 106.0.1, 107.0.0, 107.0.1, 107.0.2, 107.0.3, 108.0.0, 109.0.0, 110.0.0, 111.0.0, 112.0.0, 112.0.1, 113.0.0, 114.0.0, 114.0.1, 114.0.2, 114.0.3, 115.0.0, 115.0.1, 116.0.0, 117.0.0, 117.0.1, 117.0.2, 117.0.3, 118.0.0, 118.0.1, 119.0.0
All unaffected versions: 119.0.1, 120.0.0, 120.0.1, 120.0.2, 121.0.0, 121.0.1, 121.0.2, 122.0.0, 122.0.1, 122.0.2, 122.0.3, 122.0.4, 122.0.5, 122.0.6, 123.0.0, 123.0.1, 123.0.2, 123.0.3, 123.0.4, 124.0.0, 124.0.1, 124.0.2, 124.0.3, 124.0.4, 125.0.0, 125.0.1, 125.0.2, 125.0.3, 126.0.0, 126.0.1, 126.0.2, 126.0.3, 126.0.4, 126.0.5, 127.0.0, 127.0.1, 127.0.2, 127.0.3, 128.0.0, 128.0.1, 128.0.2, 128.0.3, 129.0.0, 129.0.1, 129.0.2, 129.0.3, 129.0.4, 130.0.0, 130.0.1, 130.0.2, 130.0.3, 130.0.4, 131.0.0, 131.0.1