Description
selenium-standalone-painful installs a start-selenium command line to start a standalone selenium server with chrome-driver. selenium-standalone-painful downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Remediation
References
https://nodesecurity.io/advisories/284
Related Vulnerabilities
CVE-2020-4051 Vulnerability in maven package org.webjars.bower:dijit
CVE-2019-20174 Vulnerability in npm package auth0-lock
CVE-2022-1233 Vulnerability in maven package org.webjars.npm:urijs
CVE-2021-43787 Vulnerability in npm package nodebb
CVE-2023-31719 Vulnerability in npm package @frangoteam/fuxa