Command Injection
Description
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Command injection in systeminformation npm package before 4.27.11 allows arbitrary OS command execution via crafted curl parameters.
Vulnerability
Description The vulnerability is a command injection flaw in the inetChecksite() function of the systeminformation npm package (versions <4.27.11). The function constructs a shell command using user-supplied parameters (e.g., a URL or service string) without proper sanitization. This allows an attacker to inject additional arguments to the curl command, leading to arbitrary command execution [2].
Exploitation
An attacker can exploit this by passing a malicious string (e.g., a URL containing -o overwrite flags or --exec commands) as the service parameter. No authentication is required if the application passes untrusted input directly to si.inetChecksite(). The injected curl arguments can overwrite JavaScript files or execute OS commands on the server [4].
Impact
Successful exploitation enables the attacker to overwrite arbitrary files (e.g., JavaScript files) within the Node.js application's context, leading to remote code execution. This can result in full compromise of the server, including data theft, service disruption, or further lateral movement.
Mitigation
The issue is fixed in version 4.27.11 and later. Users should upgrade immediately. As a workaround, if upgrading is not possible, sanitize all user inputs that are passed to the inetChecksite() function, ensuring no shell metacharacters or additional arguments can be injected [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
systeminformationnpm | < 4.27.11 | 4.27.11 |
Affected products
2- systeminformation/systeminformationdescription
Patches
1931fecaec2c1inetChecksite() fixed vulnerability: command injection
4 files changed · +14 −2
CHANGELOG.md+1 −0 modified@@ -30,6 +30,7 @@ For major (breaking) changes - version 3 and 2 see end of page. | Version | Date | Comment | | -------------- | -------------- | -------- | +| 4.27.11 | 2020-10-26 | `inetChecksite()` fixed vulnerability: command injection | | 4.27.10 | 2020-10-16 | `dockerContainers()` resolved hanging issue | | 4.27.9 | 2020-10-13 | `networkInterfaces()` loopback internal detection (windows) | | 4.27.8 | 2020-10-08 | windows codepages partial fix |
docs/history.html+5 −0 modified@@ -83,6 +83,11 @@ <h3>Full version history</h3> </tr> </thead> <tbody> + <tr> + <th scope="row">4.27.11</th> + <td>2020-10-26</td> + <td><span class="code">inetChecksite()</span> fixed vulnerability: command injection</td> + </tr> <tr> <th scope="row">4.27.10</th> <td>2020-10-16</td>
docs/index.html+1 −1 modified@@ -168,7 +168,7 @@ <img class="logo" src="assets/logo.png"> <div class="title">systeminformation</div> <div class="subtitle"><span id="typed"></span></div> - <div class="version">Current Version: <span id="version">4.27.10</span></div> + <div class="version">Current Version: <span id="version">4.27.11</span></div> <button class="btn btn-light" onclick="location.href='https://github.com/sebhildebrandt/systeminformation'">View on Github <i class=" fab fa-github"></i></button> </div> <div class="down">
lib/internet.js+7 −1 modified@@ -34,7 +34,13 @@ function inetChecksite(url, callback) { return new Promise((resolve) => { process.nextTick(() => { - const urlSanitized = util.sanitizeShellString(url).toLowerCase(); + let urlSanitized = util.sanitizeShellString(url).toLowerCase(); + urlSanitized = urlSanitized.replace(/ /g, ''); + urlSanitized = urlSanitized.replace(/\$/g, ''); + urlSanitized = urlSanitized.replace(/\(/g, ''); + urlSanitized = urlSanitized.replace(/\)/g, ''); + urlSanitized = urlSanitized.replace(/{/g, ''); + urlSanitized = urlSanitized.replace(/}/g, ''); let result = { url: urlSanitized, ok: false,
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-94xh-2fmc-xf5jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-7752ghsaADVISORY
- github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.jsghsax_refsource_MISCWEB
- github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61ghsax_refsource_MISCWEB
- github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5jghsaWEB
- snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909ghsax_refsource_MISCWEB
- www.npmjs.com/package/systeminformationghsaWEB
News mentions
0No linked articles in our index yet.