Command Injection Vulnerability
High severity
GitHub Reviewed
Published
Feb 14, 2021
in
sebhildebrandt/systeminformation
•
Updated Jul 25, 2024
Description
Reviewed
Feb 16, 2021
Published to the GitHub Advisory Database
Feb 16, 2021
Published by the National Vulnerability Database
Feb 16, 2021
Last updated
Jul 25, 2024
Impact
command injection vulnerability
Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1
Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
References