Description
Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. **Note:** An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
Remediation
References
https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
https://github.com/giggio/node-chromedriver/commit/de961e34e023afcf4fa5c0faeeec69aaa6c3c815
https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539
Related Vulnerabilities
CVE-2021-21625 Vulnerability in maven package org.jenkins-ci.plugins:aws-credentials
CVE-2023-36472 Vulnerability in npm package @strapi/utils
CVE-2020-7683 Vulnerability in npm package rollup-plugin-server
CVE-2023-36479 Vulnerability in maven package org.eclipse.jetty.ee10:jetty-ee10-servlets
CVE-2022-28820 Vulnerability in maven package com.adobe.acs:acs-aem-commons-ui.apps