First published: Tue Oct 27 2020(Updated: )
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()` ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/systeminformation | <4.26.2 | 4.26.2 |
Systeminformation Systeminformation Node.js | <4.26.2 |
https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26300 is a command injection vulnerability in the systeminformation npm package for node.js.
CVE-2020-26300 has a severity rating of 9.8, which is considered critical.
The impact of CVE-2020-26300 is a command injection vulnerability, which could allow an attacker to execute arbitrary commands on the affected system.
To fix CVE-2020-26300, you need to upgrade to version 4.26.2 or higher of the systeminformation npm package.
If you cannot upgrade to a secure version, you should ensure that service parameter strings passed to certain functions are properly checked or sanitized to prevent command injection.