systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhdh |
|
CPEs | cpe:/a:redhat:rhdh:1.4::el9 | |
Vendors & Products |
Redhat
Redhat rhdh |
Thu, 26 Dec 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 20 Dec 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-24T16:32:35.731Z
Reserved: 2024-12-19T18:39:53.612Z
Link: CVE-2024-56334

Updated: 2024-12-24T16:32:30.447Z

Status : Awaiting Analysis
Published: 2024-12-20T21:15:10.080
Modified: 2024-12-24T17:15:09.760
Link: CVE-2024-56334
