logo

CVE-2021-21388 systeminformation

Package

Manager: npm
Name: systeminformation
Vulnerable Version: >=0 <5.6.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00617 pctl0.6901

Details

Command Injection Vulnerability in systeminformation ### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

Metadata

Created: 2021-04-06T17:30:14Z
Modified: 2021-04-29T17:22:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-jff2-qjw8-5476/GHSA-jff2-qjw8-5476.json
CWE IDs: ["CWE-77", "CWE-78"]
Alternative ID: GHSA-jff2-qjw8-5476
Finding: F404
Auto approve: 1