Description
Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. **Note:** An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
Remediation
References
https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539
https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
https://github.com/giggio/node-chromedriver/commit/de961e34e023afcf4fa5c0faeeec69aaa6c3c815
Related Vulnerabilities
CVE-2020-2140 Vulnerability in maven package org.jenkins-ci.plugins:audit-trail
CVE-2019-19771 Vulnerability in npm package hdeky
CVE-2023-40339 Vulnerability in maven package org.jenkins-ci.plugins:config-file-provider
CVE-2018-11796 Vulnerability in maven package org.apache.tika:tika-core
CVE-2020-17510 Vulnerability in maven package org.apache.shiro:shiro-spring-boot-web-starter