Description
selenium-standalone-painful installs a start-selenium command line to start a standalone selenium server with chrome-driver. selenium-standalone-painful downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Remediation
References
https://nodesecurity.io/advisories/284
Related Vulnerabilities
CVE-2023-22665 Vulnerability in maven package org.apache.jena:jena-arq
CVE-2020-2118 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-githubnotify-step
CVE-2022-31692 Vulnerability in maven package org.springframework.security:spring-security-web
CVE-2019-10786 Vulnerability in npm package network-manager
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:jasper