Description
selenium-standalone-painful installs a start-selenium command line to start a standalone selenium server with chrome-driver. selenium-standalone-painful downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Remediation
References
https://nodesecurity.io/advisories/284
Related Vulnerabilities
CVE-2022-43403 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2021-3780 Vulnerability in npm package peertube
CVE-2016-10735 Vulnerability in maven package org.webjars.npm:bootstrap-sass
CVE-2020-2192 Vulnerability in maven package org.jenkins-ci.plugins:swarm-plugin
CVE-2023-25768 Vulnerability in maven package org.jenkins-ci.plugins:azure-credentials