logo

CVE-2021-21315 systeminformation

Package

Manager: npm
Name: systeminformation
Vulnerable Version: >=0 <5.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.93764 pctl0.99852

Details

Command Injection Vulnerability ### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

Metadata

Created: 2021-02-16T16:51:04Z
Modified: 2024-07-25T15:00:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/02/GHSA-2m8v-572m-ff2v/GHSA-2m8v-572m-ff2v.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-2m8v-572m-ff2v
Finding: F404
Auto approve: 1