First published: Thu Sep 21 2023(Updated: )
### Impact SSID Command Injection Vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.21.7, Version 4 was not affected ### Workarounds If you cannot upgrade, be sure to check or sanitize parameter strings that are passed to wifiConnections(), wifiNetworks() (string only) ### References See also https://systeminformation.io/security.html
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/systeminformation | >=5.0.0<5.21.7 | 5.21.7 |
Systeminformation Systeminformation Node.js | >=5.0.0<5.21.7 |
https://github.com/sebhildebrandt/systeminformation/commit/7972565812ccb2a610a22911c54c3446f4171392
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42810 is a SSID Command Injection Vulnerability with critical severity (9.8).
CVE-2023-42810 was fixed with a parameter check in version >= 5.21.7 of the systeminformation package.
To fix CVE-2023-42810, please upgrade to version >= 5.21.7 of the systeminformation package.
If you cannot upgrade, make sure to check or sanitize parameter strings that are passed to wifiConnections(), wifiNetworks(), and wifiInterfaces() functions.
You can find more information about CVE-2023-42810 at the following references: [link1], [link2], [link3].