Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-56334

Опубликовано: 20 дек. 2024
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the getWindowsIEEE8021x function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

A flaw was found in the systeminformation library for Node.js. In Windows systems, the SSID parameter of the getWindowsIEEE8021x function is not sanitized before it is passed to cmd.exe. This may allow a remote attacker to execute arbitrary commands on the target system.

Отчет

This vulnerability in the systeminformation library is marked as a high-severity issue because it allows for the execution of arbitrary commands via an unsanitized SSID input passed to cmd.exe. Since this flaw can lead to remote code execution (RCE) or local privilege escalation, it provides an attacker with the potential to execute malicious scripts on the affected system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Hubrhdh/rhdh-rhel9-operatorNot affected
Red Hat Developer Hub 1.5registry.redhat.io/rhdh/rhdh-hub-rhel9FixedRHSA-2025:337427.03.2025
Red Hat Developer Hub (RHDH) 1.4registry.redhat.io/rhdh/rhdh-hub-rhel9FixedRHBA-2025:040920.01.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2333587systeminformation: Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation

EPSS

Процентиль: 47%
0.00236
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 1 года назад

systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.8
github
около 1 года назад

Systeminformation has command injection vulnerability in getWindowsIEEE8021x (SSID)

CVSS3: 7.8
fstec
около 1 года назад

Уязвимость функции getWindowsIEEE8021x пакета npm systeminformation программной платформы Node.js, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды

EPSS

Процентиль: 47%
0.00236
Низкий

8 High

CVSS3