Описание
systeminformation command injection vulnerability
Impact
command injection vulnerability
Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
References
Are there any links users can visit to find out more?
For more information
If you have any questions or comments about this advisory:
- Open an issue in systeminformation
Ссылки
- https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j
- https://nvd.nist.gov/vuln/detail/CVE-2020-7752
- https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61
- https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js
- https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909
- https://www.npmjs.com/package/systeminformation
Пакеты
Наименование
systeminformation
npm
Затронутые версииВерсия исправления
< 4.27.11
4.27.11
Связанные уязвимости
CVSS3: 8.8
nvd
больше 5 лет назад
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.