Skip to content

Commit 7ecc1cb

Browse files
committed
Update vulnerable version
1 parent 9bfccc4 commit 7ecc1cb

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

documentation/modules/exploit/linux/http/selenium_greed_chrome_rce_cve_2022_28108.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,12 @@ such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.
55

66
The vulnerability affects:
77

8-
* Selenium Server (Grid) before 4
8+
* Selenium Server (Grid) before 4.0.0-alpha-7
99

1010
This module was successfully tested on:
1111

1212
* selenium/standalone-chrome:3.141.59 installed with Docker on Ubuntu 20.0.4
13+
* selenium/standalone-chrome:4.0.0-alpha-6-20200730 installed with Docker on Ubuntu 20.0.4
1314

1415

1516
### Installation

modules/exploits/linux/http/selenium_greed_chrome_rce_cve_2022_28108.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
info,
1616
'Name' => 'Selenium chrome RCE',
1717
'Description' => %q{
18-
Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types
18+
Selenium Server (Grid) before 4.0.0-alpha-7 allows CSRF because it permits non-JSON content types
1919
such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.
2020
},
2121
'Author' => [

0 commit comments

Comments
 (0)