CVE-2021-21315
Command Injection Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- December 22, 2020
- Published Date
- February 16, 2021
- Last Updated
- February 06, 2025
- Vendor
- sebhildebrandt
- Product
- systeminformation
- Description
- The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
- Tags
- Exploitation
- active
- Technical Impact
- partial
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-01-18 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-21315.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
G01d3nW01f/CVE-2021-21315
Type: github • Created: 2021-11-10 06:40:17 UTC • Stars: 1
alikarimi999/CVE-2021-21315
Type: github • Created: 2021-09-07 14:31:20 UTC • Stars: 4
ForbiddenProgrammer/CVE-2021-21315-PoC
Type: github • Created: 2021-03-01 18:52:41 UTC • Stars: 156
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel
-
Detected by Nuclei