Описание
Command Injection in systeminformation
Impact
command injection vulnerability
Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to is.services(), is.inetChecksite(), si.inetLatency(), si.networkStats(), is.services() and si.processLoad()
References
Are there any links users can visit to find out more?
For more information
If you have any questions or comments about this advisory:
- Open an issue in systeminformation
Ссылки
- https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4
- https://nvd.nist.gov/vuln/detail/CVE-2020-26300
- https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607
- https://github.com/advisories/GHSA-fj59-f6c3-3vw4
- https://www.npmjs.com/package/systeminformation
Пакеты
systeminformation
< 4.26.2
4.26.2
Связанные уязвимости
systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix.