CVE-2021-21315

The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:a:apache:cordova:10.0.0:*:*:*:*:-:*:*

History

07 Nov 2023, 03:29

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'name': '[cordova-issues] 20210224 [GitHub] [cordova-cli] iva2k opened a new issue #549: update systeminformation package to >=5.3.1', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05%40%3Cissues.cordova.apache.org%3E -

25 Mar 2021, 18:41

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210312-0007/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210312-0007/ - Third Party Advisory

12 Mar 2021, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210312-0007/ -

08 Mar 2021, 14:46

Type Values Removed Values Added
CPE cpe:2.3:a:apache:cordova:10.0.0:*:*:*:*:-:*:*
References (MLIST) https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E - Mailing List, Third Party Advisory

25 Feb 2021, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E -

22 Feb 2021, 21:15

Type Values Removed Values Added
References (MISC) https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525 - (MISC) https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v - (CONFIRM) https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v - Third Party Advisory
References (MISC) https://www.npmjs.com/package/systeminformation - (MISC) https://www.npmjs.com/package/systeminformation - Product, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
CPE cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*

16 Feb 2021, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-16 17:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-21315

Mitre link : CVE-2021-21315

CVE.ORG link : CVE-2021-21315


JSON object : View

Products Affected

apache

  • cordova

systeminformation

  • systeminformation
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')