8.8
CVE-2022-28109
- EPSS 0.35%
- Veröffentlicht 15.04.2022 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:56:46
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Selenium ≫ Selenium Grid Version < 4.0.0
Selenium ≫ Selenium Grid Version4.0.0 Update-
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha1
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha2
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha3
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha4
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha5
Selenium ≫ Selenium Grid Version4.0.0 Updatealpha6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.35% | 0.567 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.