Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade browser-use
to version 0.1.45 or higher.
browser-use is a Make websites accessible for AI agents
Affected versions of this package are vulnerable to Use of Non-Canonical URL Paths for Authorization Decisions through the _is_url_allowed()
method, that responsible for checking allowed_domains
list from BrowserContextConfig
class . An attacker can manipulate basic authentication credentials and access restricted internal services by providing a username: password pair where the username is a whitelisted domain, effectively bypassing the domain check, even though the actual domain remains different.
Note: The vulnerability affects all users relying on this functionality for security and allows unauthorized enumeration of localhost services and internal networks.