{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T14:24:10.993","vulnerabilities":[{"cve":{"id":"CVE-2023-48699","sourceIdentifier":"security-advisories@github.com","published":"2023-11-21T23:15:08.103","lastModified":"2024-11-21T08:32:17.010","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function `def __locator__(self, locator_name: str)` in `page.py`. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above."},{"lang":"es","value":"fastbots es una librería para el desarrollo rápido de robots y raspadores utilizando selenio y el diseño de Page Object Model (POM). Antes de la versión 0.1.5, un atacante podía modificar el archivo localizador locators.ini con código Python que sin la validación adecuada se ejecutaba y podría provocar rce. La vulnerabilidad está en la función `def __locator__(self, locator_name: str)` en `page.py`. Para mitigar este problema, actualice a la versión 0.1.5 o superior de fastbots."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-95"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ubertidavide:fastbots:*:*:*:*:*:*:*:*","versionEndExcluding":"0.1.5","matchCriteriaId":"F4D23CDD-ACB2-427B-BC2C-1F98D79FE70C"}]}]}],"references":[{"url":"https://github.com/ubertidavide/fastbots/commit/73eb03bd75365e112b39877e26ef52853f5e9f57","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/ubertidavide/fastbots/commit/73eb03bd75365e112b39877e26ef52853f5e9f57","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/ubertidavide/fastbots/security/advisories/GHSA-vccg-f4gp-45x9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}