CISA KEV 정보
| 취약점명 | System Information Library for Node.JS Command Injection |
|---|---|
| 설명 | In this vulnerability, an attacker can send a malicious payload that will exploit the name parameter. After successful exploitation, attackers can execute remote. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-78 |
| 등록일 (KEV) | 2022-01-18 |
| 조치 기한 | 2022-02-01 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2021-21315 |
NVD 상세 정보
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:NAV:L/AC:L/Au:N/C:P/I:P/A:P설명: The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
CWE: CWE-78 | CWE-78
참조
- https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525 [Patch]
- https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v [Third Party Advisory]
- https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05%40%3Cissues.cordova.apache.org%3E [Issue Tracking, Mailing List]
- https://security.netapp.com/advisory/ntap-20210312-0007/ [Third Party Advisory]
- https://www.npmjs.com/package/systeminformation [Product]
- https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525 [Patch]
- https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v [Third Party Advisory]
- https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05%40%3Cissues.cordova.apache.org%3E [Issue Tracking, Mailing List]
- https://security.netapp.com/advisory/ntap-20210312-0007/ [Third Party Advisory]
- https://www.npmjs.com/package/systeminformation [Product]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21315 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.