Lucene search

K
githubGitHub Advisory DatabaseGHSA-VCCG-F4GP-45X9
HistoryNov 21, 2023 - 10:18 p.m.

Eval Injection in fastbots

2023-11-2122:18:22
CWE-94
CWE-95
GitHub Advisory Database
github.com
8
fastbots
eval injection
locators.ini
python code
rce
function
vulnerability
upgrade
version 0.1.5
patch
github
reference
software

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.7%

Impact

An attacker could modify the locators.ini locator file with python code that without proper validation it’s executed and it could lead to rce. The vulnerability is in the function def locator(self, locator_name: str) in page.py. The vulnerable code that load and execute directly from the file without validation it’s:

 return eval(self._bot.locator(self._page_name, locator_name))

Patches

In order to mitigate this issue it’s important to upgrade to fastbots version 0.1.5 or above.

References

Merge that fix also this issue

Affected configurations

Vulners
Node
ubertidavidefastbotsRange<0.1.5
CPENameOperatorVersion
fastbotslt0.1.5

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.7%

Related for GHSA-VCCG-F4GP-45X9