Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpoNXctNjk2NC14NWNm
Downloads Resources over HTTP in chromedriver
Affected versions of chromedriver
insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one.
Recommendation
Update to version 2.26.1 or later.
Permalink: https://github.com/advisories/GHSA-jh5w-6964-x5cfJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpoNXctNjk2NC14NWNm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
EPSS Percentage: 0.00175
EPSS Percentile: 0.5554
Identifiers: GHSA-jh5w-6964-x5cf, CVE-2016-10579
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10579
- https://github.com/advisories/GHSA-jh5w-6964-x5cf
- https://www.npmjs.com/advisories/160
Affected Packages
npm:chromedriver
Dependent packages: 4,158Dependent repositories: 50,928
Downloads: 2,906,836 last month
Affected Version Ranges: < 2.26.1
Fixed in: 2.26.1
All affected versions: 2.0.0, 2.0.1, 2.2.0, 2.3.0, 2.6.0, 2.8.0, 2.8.1, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.14.1, 2.15.0, 2.15.1, 2.15.2, 2.16.0, 2.18.0, 2.19.0, 2.20.0, 2.21.0, 2.21.1, 2.21.2, 2.22.0, 2.22.1, 2.22.2, 2.23.0, 2.23.1, 2.24.0, 2.24.1, 2.25.0, 2.25.1, 2.25.2, 2.25.3, 2.26.0
All unaffected versions: 2.26.1, 2.26.2, 2.27.0, 2.27.1, 2.27.2, 2.27.3, 2.28.0, 2.29.0, 2.29.1, 2.29.2, 2.30.0, 2.30.1, 2.31.0, 2.32.0, 2.32.1, 2.32.2, 2.32.3, 2.33.0, 2.33.1, 2.33.2, 2.34.0, 2.34.1, 2.35.0, 2.36.0, 2.37.0, 2.38.0, 2.38.1, 2.38.2, 2.38.3, 2.39.0, 2.40.0, 2.41.0, 2.42.0, 2.42.1, 2.43.0, 2.43.1, 2.43.2, 2.43.3, 2.43.4, 2.44.0, 2.44.1, 2.45.0, 2.46.0, 73.0.0, 74.0.0, 75.0.0, 75.0.1, 75.1.0, 76.0.0, 76.0.1, 77.0.0, 78.0.0, 78.0.1, 79.0.0, 79.0.1, 79.0.2, 79.0.3, 80.0.0, 80.0.1, 80.0.2, 81.0.0, 83.0.0, 83.0.1, 84.0.0, 84.0.1, 85.0.0, 85.0.1, 86.0.0, 87.0.0, 87.0.1, 87.0.2, 87.0.3, 87.0.4, 87.0.5, 87.0.6, 87.0.7, 88.0.0, 89.0.0, 90.0.0, 90.0.1, 91.0.0, 91.0.1, 92.0.0, 92.0.1, 92.0.2, 93.0.0, 93.0.1, 94.0.0, 95.0.0, 96.0.0, 97.0.0, 97.0.1, 97.0.2, 97.0.3, 97.0.4, 98.0.0, 98.0.1, 99.0.0, 100.0.0, 101.0.0, 102.0.0, 103.0.0, 104.0.0, 105.0.0, 105.0.1, 106.0.0, 106.0.1, 107.0.0, 107.0.1, 107.0.2, 107.0.3, 108.0.0, 109.0.0, 110.0.0, 111.0.0, 112.0.0, 112.0.1, 113.0.0, 114.0.0, 114.0.1, 114.0.2, 114.0.3, 115.0.0, 115.0.1, 116.0.0, 117.0.0, 117.0.1, 117.0.2, 117.0.3, 118.0.0, 118.0.1, 119.0.0, 119.0.1, 120.0.0, 120.0.1, 120.0.2, 121.0.0, 121.0.1, 121.0.2, 122.0.0, 122.0.1, 122.0.2, 122.0.3, 122.0.4, 122.0.5, 122.0.6, 123.0.0, 123.0.1, 123.0.2, 123.0.3, 123.0.4, 124.0.0, 124.0.1, 124.0.2, 124.0.3, 124.0.4, 125.0.0, 125.0.1, 125.0.2, 125.0.3, 126.0.0, 126.0.1, 126.0.2, 126.0.3, 126.0.4, 126.0.5, 127.0.0, 127.0.1, 127.0.2, 127.0.3, 128.0.0, 128.0.1, 128.0.2, 128.0.3, 129.0.0, 129.0.1, 129.0.2, 129.0.3, 129.0.4, 130.0.0, 130.0.1, 130.0.2, 130.0.3, 130.0.4, 131.0.0, 131.0.1