fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function `def __locator__(self, locator_name: str)` in `page.py`. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above.
References
| Link | Resource |
|---|---|
| https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9 | Exploit Vendor Advisory |
| https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806 | Issue Tracking Patch |
| https://github.com/ubertidavide/fastbots/commit/73eb03bd75365e112b39877e26ef52853f5e9f57 | Patch |
Configurations
Information
Published : 2023-11-21 23:15
Updated : 2023-11-30 15:15
NVD link : CVE-2023-48699
Mitre link : CVE-2023-48699
JSON object : View
Products Affected
ubertidavide
- fastbots
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
