Skip to content

Conversation

@huntr-helper
Copy link

https://huntr.dev/users/Mik317 has fixed the Resources Downloaded over Insecure Protocol vulnerability 🔨. Mik317 has been awarded $25 for fixing the vulnerability through the huntr bug bounty program 💵. Think you could fix a vulnerability like this?

Get involved at https://huntr.dev/

Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/npm/selenium-wrapper/1/README.md

User Comments:

Bounty URL: https://www.huntr.dev/bounties/1-npm-selenium-wrapper/

⚙️ Description *

The selenium wrapper module contained a install.js script which downloaded some jar files using an insecure HTTP connection, which made the client vulnerable against file corruption and arbitrary command execution.

💻 Technical Description *

I've simply switched the link to https: the certificate for the https version of the resource is verified correctly and using https as library avoids mitm attacks.

🐛 Proof of Concept (PoC) *

No needed

🔥 Proof of Fix (PoF) *

No needed

👍 User Acceptance Testing (UAT)

Downloaded correctly the file and no error thrown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants