First published: Mon Oct 26 2020(Updated: )
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite() ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/systeminformation | <4.27.11 | 4.27.11 |
Systeminformation Systeminformation Node.js | <4.27.11 |
https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7752 is high with a CVSS score of 8.8.
To fix CVE-2020-7752, you need to upgrade the systeminformation package to version 4.27.11 or later.
Yes, if you cannot upgrade the systeminformation package, you can check or sanitize service parameter strings that are passed to si.inetChecksite().
CVE-2020-7752 is a command injection vulnerability that could allow an attacker to execute arbitrary commands on the affected system.
You can find more information about CVE-2020-7752 at the following references: [Link 1](https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j), [Link 2](https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61), [Link 3](https://www.npmjs.com/package/systeminformation).