getWindowsIEEE8021x (SSID) 函数中的命令注入漏洞在 systeminformation 中
平台
nodejs
组件
systeminformation
修复版本
5.23.8
CVE-2024-56334 describes a Command Injection vulnerability discovered in the systeminformation Node.js library. This flaw allows attackers to execute arbitrary operating system commands by injecting malicious content into SSIDs. The vulnerability impacts versions of systeminformation up to 5.23.7, and a fix is available in version 5.23.7. Users are strongly advised to upgrade immediately.
影响与攻击场景翻译中…
The vulnerability arises from insufficient sanitization of SSIDs before they are passed as parameters to cmd.exe within the getWindowsIEEE8021x function. An attacker who can control the SSID value, either directly or indirectly through a compromised system, can inject malicious commands. Successful exploitation could lead to remote code execution (RCE) or local privilege escalation, depending on the context in which the systeminformation package is used. This could allow an attacker to gain control of the affected system, steal sensitive data, or install malware.
利用背景翻译中…
This vulnerability was publicly disclosed on December 20, 2024. There are currently no known active campaigns exploiting this specific vulnerability, but the ease of exploitation and potential for RCE suggest it could become a target. No public proof-of-concept (PoC) code has been released as of this writing, but the vulnerability's nature makes it likely that PoCs will emerge. It is not currently listed on the CISA KEV catalog.
哪些人处于风险中翻译中…
Applications and systems that utilize the systeminformation Node.js library, particularly those that dynamically retrieve or process SSIDs from network interfaces, are at risk. This includes applications performing network diagnostics, system monitoring, or wireless configuration management. Shared hosting environments where multiple applications share the same Node.js runtime are also at increased risk.
检测步骤翻译中…
• nodejs: Use npm audit to identify vulnerable dependencies.
npm audit systeminformation• nodejs: Check for the presence of systeminformation in package.json and verify the version is less than 5.23.7.
grep "systeminformation" package.json• generic web: Monitor Node.js application logs for unusual command execution attempts related to network interfaces or wireless configurations. Look for patterns resembling shell commands within SSID strings.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
2.10% (84% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 本地 — 攻击者需要系统上的本地会话或Shell。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 需要 — 受害者必须打开文件、点击链接或访问特制页面。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2024-56334 is to upgrade to version 5.23.7 or later of the systeminformation package. There are no known workarounds for this vulnerability beyond upgrading. If upgrading is not immediately feasible due to compatibility issues or breaking changes, carefully review all code that utilizes the getWindowsIEEE8021x function and implement strict input validation to sanitize SSIDs before they are passed to cmd.exe. After upgrading, confirm the fix by attempting to trigger the vulnerable function with a crafted SSID containing malicious commands; the command should not be executed.
修复方法翻译中…
Actualice la biblioteca systeminformation a la versión 5.23.7 o superior. Esto corrige la vulnerabilidad de inyección de comandos en la función getWindowsIEEE8021x (SSID). Ejecute `npm install systeminformation@latest` para actualizar.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2024-56334 — Command Injection in systeminformation?
CVE-2024-56334 is a Command Injection vulnerability in the systeminformation Node.js library, allowing attackers to execute OS commands through unsanitized SSIDs. It affects versions up to 5.23.7.
Am I affected by CVE-2024-56334 in systeminformation?
You are affected if you are using systeminformation version 5.23.7 or earlier. Check your package.json file to determine your version.
How do I fix CVE-2024-56334 in systeminformation?
Upgrade to version 5.23.7 or later of the systeminformation package using npm install systeminformation@latest. There are no known workarounds.
Is CVE-2024-56334 being actively exploited?
As of December 2024, there are no confirmed reports of active exploitation, but the vulnerability's nature makes it a potential target.
Where can I find the official systeminformation advisory for CVE-2024-56334?
Refer to the systeminformation GitHub repository for updates and advisories: https://github.com/systeminformation/systeminformation