logo

CVE-2023-48699 fastbots

Package

Manager: pip
Name: fastbots
Vulnerable Version: >=0 <0.1.5

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00642 pctl0.69695

Details

Eval Injection in fastbots ### Impact An attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function def __locator__(self, locator_name: str) in page.py. The vulnerable code that load and execute directly from the file without validation it's: ```python return eval(self._bot.locator(self._page_name, locator_name)) ``` ### Patches In order to mitigate this issue it's important to upgrade to fastbots version 0.1.5 or above. ### References [Merge that fix also this issue](https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806)

Metadata

Created: 2023-11-21T22:18:22Z
Modified: 2023-11-22T18:08:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-vccg-f4gp-45x9/GHSA-vccg-f4gp-45x9.json
CWE IDs: ["CWE-94", "CWE-95"]
Alternative ID: GHSA-vccg-f4gp-45x9
Finding: F184
Auto approve: 1