Описание
systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the getWindowsIEEE8021x function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
A flaw was found in the systeminformation library for Node.js. In Windows systems, the SSID parameter of the getWindowsIEEE8021x function is not sanitized before it is passed to cmd.exe. This may allow a remote attacker to execute arbitrary commands on the target system.
Отчет
This vulnerability in the systeminformation library is marked as a high-severity issue because it allows for the execution of arbitrary commands via an unsanitized SSID input passed to cmd.exe. Since this flaw can lead to remote code execution (RCE) or local privilege escalation, it provides an attacker with the potential to execute malicious scripts on the affected system.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Developer Hub | rhdh/rhdh-rhel9-operator | Not affected | ||
| Red Hat Developer Hub 1.5 | registry.redhat.io/rhdh/rhdh-hub-rhel9 | Fixed | RHSA-2025:3374 | 27.03.2025 |
| Red Hat Developer Hub (RHDH) 1.4 | registry.redhat.io/rhdh/rhdh-hub-rhel9 | Fixed | RHBA-2025:0409 | 20.01.2025 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
8 High
CVSS3
Связанные уязвимости
systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Systeminformation has command injection vulnerability in getWindowsIEEE8021x (SSID)
Уязвимость функции getWindowsIEEE8021x пакета npm systeminformation программной платформы Node.js, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
EPSS
8 High
CVSS3