Description
selenium-standalone-painful installs a start-selenium command line to start a standalone selenium server with chrome-driver. selenium-standalone-painful downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Remediation
References
https://nodesecurity.io/advisories/284
Related Vulnerabilities
CVE-2022-4742 Vulnerability in npm package json-pointer
CVE-2022-21211 Vulnerability in npm package posix
CVE-2022-43426 Vulnerability in maven package io.jenkins.plugins:s3explorer
CVE-2016-20018 Vulnerability in npm package knex
CVE-2019-14517 Vulnerability in maven package org.webjars.bowergithub.pandao:editor.md