[CVE-2021-21315] System Information Library for Node.JS Command Injection

SecurityDesk
2022.01.18 00:00 조회 7

CISA KEV 정보

취약점명System Information Library for Node.JS Command Injection
설명In this vulnerability, an attacker can send a malicious payload that will exploit the name parameter. After successful exploitation, attackers can execute remote.
조치사항Apply updates per vendor instructions.
랜섬웨어 캠페인 악용Unknown
CWECWE-78
등록일 (KEV)2022-01-18
조치 기한2022-02-01
추가 참고https://nvd.nist.gov/vuln/detail/CVE-2021-21315

NVD 상세 정보

CVSS v3.1: 7.1 HIGHCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVSS v2.0: 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P

설명: The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

CWE: CWE-78 | CWE-78

참조

This product uses the NVD API but is not endorsed or certified by the NVD.



바로 가기

IT 도구 서랍

→ Unix: 2025-01-15T09:30:00
→ 날짜: 1736934600

→ ASCII: ABC
→ 문자: 65 66 67

ASCII 코드표 — 클릭하면 입력란에 추가

DecHex약어설명
DecHex문자
DecHex문자

→ 유니코드: 홍길동
→ 문자: \ud64d\uae38\ub3d9