selenium-exposure: Selenium - Node Exposure

日期: 2025-08-01 | 影响软件: Selenium | POC: 已公开

漏洞描述

Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies.

PoC代码[已公开]

id: selenium-exposure

info:
  name: Selenium - Node Exposure
  author: w0Tx
  severity: high
  description: |
    Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies.
  reference:
    - https://nutcrackerssecurity.github.io/selenium.html
    - https://labs.detectify.com/2017/10/06/guest-blog-dont-leave-your-grid-wide-open/
  classification:
    cpe: cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: selenium
    product: selenium
    shodan-query: "/wd/hub"
  tags: misconfig,selenium,misconfiguration,rce,chromium,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/wd/hub"

    host-redirects: true
    max-redirects: 2

    matchers-condition: and
    matchers:
      - type: word
        words:
          - 'WebDriverRequest'
          - '<title>WebDriver Hub</title>'
        condition: or

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100bed84fbb281c2b85f372cdce060c3a200f4672574aab4329f8af42f0955c7bad02210096c36843abde229e19791825f4e789ff398dbd30f9837480333b8239c6ad950d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐