8.8

CVE-2022-28109

Exploit
Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SeleniumSelenium Grid Version < 4.0.0
SeleniumSelenium Grid Version4.0.0 Update-
SeleniumSelenium Grid Version4.0.0 Updatealpha1
SeleniumSelenium Grid Version4.0.0 Updatealpha2
SeleniumSelenium Grid Version4.0.0 Updatealpha3
SeleniumSelenium Grid Version4.0.0 Updatealpha4
SeleniumSelenium Grid Version4.0.0 Updatealpha5
SeleniumSelenium Grid Version4.0.0 Updatealpha6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.35% 0.567
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.