npm

Severity: high

Downloads Resources over HTTP

selenium-chromedriver

Overview

Affected versions of selenium-chromedriver insecurely download an executable over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running selenium-chromedriver.

Remediation

No patch is currently available for this vulnerability, and the author has marked the package as deprecated.

The best mitigation is currently to avoid using this package, using a different package if available.

Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo

Have content suggestions? Send them to [email protected]

Advisory timeline

  1. published

    Advisory published
    Jan 1st, 2017
  2. reported

    Initial report by Adam Baldwin
    Dec 1st, 2016