Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpoNXctNjk2NC14NWNm

Downloads Resources over HTTP in chromedriver

Affected versions of chromedriver insecurely download resources over HTTP.

In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one.

Recommendation

Update to version 2.26.1 or later.

Permalink: https://github.com/advisories/GHSA-jh5w-6964-x5cf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpoNXctNjk2NC14NWNm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago


EPSS Percentage: 0.00175
EPSS Percentile: 0.5554

Identifiers: GHSA-jh5w-6964-x5cf, CVE-2016-10579
References: Blast Radius: 0.0

Affected Packages

npm:chromedriver
Dependent packages: 4,158
Dependent repositories: 50,928
Downloads: 2,906,836 last month
Affected Version Ranges: < 2.26.1
Fixed in: 2.26.1
All affected versions: 2.0.0, 2.0.1, 2.2.0, 2.3.0, 2.6.0, 2.8.0, 2.8.1, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.14.1, 2.15.0, 2.15.1, 2.15.2, 2.16.0, 2.18.0, 2.19.0, 2.20.0, 2.21.0, 2.21.1, 2.21.2, 2.22.0, 2.22.1, 2.22.2, 2.23.0, 2.23.1, 2.24.0, 2.24.1, 2.25.0, 2.25.1, 2.25.2, 2.25.3, 2.26.0
All unaffected versions: 2.26.1, 2.26.2, 2.27.0, 2.27.1, 2.27.2, 2.27.3, 2.28.0, 2.29.0, 2.29.1, 2.29.2, 2.30.0, 2.30.1, 2.31.0, 2.32.0, 2.32.1, 2.32.2, 2.32.3, 2.33.0, 2.33.1, 2.33.2, 2.34.0, 2.34.1, 2.35.0, 2.36.0, 2.37.0, 2.38.0, 2.38.1, 2.38.2, 2.38.3, 2.39.0, 2.40.0, 2.41.0, 2.42.0, 2.42.1, 2.43.0, 2.43.1, 2.43.2, 2.43.3, 2.43.4, 2.44.0, 2.44.1, 2.45.0, 2.46.0, 73.0.0, 74.0.0, 75.0.0, 75.0.1, 75.1.0, 76.0.0, 76.0.1, 77.0.0, 78.0.0, 78.0.1, 79.0.0, 79.0.1, 79.0.2, 79.0.3, 80.0.0, 80.0.1, 80.0.2, 81.0.0, 83.0.0, 83.0.1, 84.0.0, 84.0.1, 85.0.0, 85.0.1, 86.0.0, 87.0.0, 87.0.1, 87.0.2, 87.0.3, 87.0.4, 87.0.5, 87.0.6, 87.0.7, 88.0.0, 89.0.0, 90.0.0, 90.0.1, 91.0.0, 91.0.1, 92.0.0, 92.0.1, 92.0.2, 93.0.0, 93.0.1, 94.0.0, 95.0.0, 96.0.0, 97.0.0, 97.0.1, 97.0.2, 97.0.3, 97.0.4, 98.0.0, 98.0.1, 99.0.0, 100.0.0, 101.0.0, 102.0.0, 103.0.0, 104.0.0, 105.0.0, 105.0.1, 106.0.0, 106.0.1, 107.0.0, 107.0.1, 107.0.2, 107.0.3, 108.0.0, 109.0.0, 110.0.0, 111.0.0, 112.0.0, 112.0.1, 113.0.0, 114.0.0, 114.0.1, 114.0.2, 114.0.3, 115.0.0, 115.0.1, 116.0.0, 117.0.0, 117.0.1, 117.0.2, 117.0.3, 118.0.0, 118.0.1, 119.0.0, 119.0.1, 120.0.0, 120.0.1, 120.0.2, 121.0.0, 121.0.1, 121.0.2, 122.0.0, 122.0.1, 122.0.2, 122.0.3, 122.0.4, 122.0.5, 122.0.6, 123.0.0, 123.0.1, 123.0.2, 123.0.3, 123.0.4, 124.0.0, 124.0.1, 124.0.2, 124.0.3, 124.0.4, 125.0.0, 125.0.1, 125.0.2, 125.0.3, 126.0.0, 126.0.1, 126.0.2, 126.0.3, 126.0.4, 126.0.5, 127.0.0, 127.0.1, 127.0.2, 127.0.3, 128.0.0, 128.0.1, 128.0.2, 128.0.3, 129.0.0, 129.0.1, 129.0.2, 129.0.3, 129.0.4, 130.0.0, 130.0.1, 130.0.2, 130.0.3, 130.0.4, 131.0.0, 131.0.1