CVE-2021-21315
System Information Library for Node.JS Command Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
6Exploited in Wild
YesDecision
Descriptions
The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
La Biblioteca System Information para Node.JS (paquete npm "systeminformation") es una colección de funciones de código abierto para recuperar información detallada sobre el hardware, el sistema y el SO. En systeminformation versiones anteriores a 5.3.1, se presenta una vulnerabilidad de inyección de comandos. El problema se ha corregido en la versión 5.3.1. Como solución en lugar de actualizar, asegúrese de comprobar o sanear los parámetros de servicio que son pasados a las funciones si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... sólo permiten cadenas, rechazan cualquier matriz. El saneamiento de cadenas funciona como se esperaba
In this vulnerability, an attacker can send a malicious payload that will exploit the name parameter. After successful exploitation, attackers can execute remote.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-22 CVE Reserved
- 2021-02-16 CVE Published
- 2021-03-13 First Exploit
- 2022-01-18 Exploited in Wild
- 2022-02-01 KEV Due Date
- 2024-08-03 CVE Updated
- 2024-12-17 EPSS Updated
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v | Third Party Advisory | |
https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05%40%3Cissues.cordova.apache.org%3E | Issue Tracking | |
https://security.netapp.com/advisory/ntap-20210312-0007 | Third Party Advisory | |
https://www.npmjs.com/package/systeminformation | Product |
URL | Date | SRC |
---|---|---|
https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC | 2021-06-09 | |
https://github.com/alikarimi999/CVE-2021-21315 | 2021-09-20 | |
https://github.com/G01d3nW01f/CVE-2021-21315 | 2021-12-27 | |
https://github.com/MazX0p/CVE-2021-21315-exploit | 2021-07-18 | |
https://github.com/xMohamed0/CVE-2021-21315-POC | 2021-11-14 | |
https://github.com/cherrera0001/CVE-2021-21315v2 | 2021-03-13 |
URL | Date | SRC |
---|---|---|
https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525 | 2024-07-24 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Systeminformation Search vendor "Systeminformation" | Systeminformation Search vendor "Systeminformation" for product "Systeminformation" | < 5.3.1 Search vendor "Systeminformation" for product "Systeminformation" and version " < 5.3.1" | node.js |
Affected
| ||||||
Apache Search vendor "Apache" | Cordova Search vendor "Apache" for product "Cordova" | 10.0.0 Search vendor "Apache" for product "Cordova" and version "10.0.0" | - |
Affected
|