Headline
CVE-2023-48699: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in fastbots
fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it’s executed and it could lead to rce. The vulnerability is in the function def __locator__(self, locator_name: str)
in page.py
. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above.
Impact
An attacker could modify the locators.ini locator file with python code that without proper validation it’s executed and it could lead to rce.
The vulnerability is in the function def locator(self, locator_name: str) in page.py.
The vulnerable code that load and execute directly from the file without validation it’s:
return eval(self._bot.locator(self._page_name, locator_name))
Patches
In order to mitigate this issue it’s important to upgrade to fastbots version 0.1.5 or above.
The
References
Merge that fix also this issue
Related news
### Impact An attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function def __locator__(self, locator_name: str) in page.py. The vulnerable code that load and execute directly from the file without validation it's: ```python return eval(self._bot.locator(self._page_name, locator_name)) ``` ### Patches In order to mitigate this issue it's important to upgrade to fastbots version 0.1.5 or above. ### References [Merge that fix also this issue](https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806)