-
Notifications
You must be signed in to change notification settings - Fork 3.3k
fix(deps): update dependency systeminformation to v5.23.8 [security] #32234
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update dependency systeminformation to v5.23.8 [security] #32234
Conversation
See the guidelines for reviewing dependency updates for info on how to review dependency update PRs. |
296d196
to
07e9002
Compare
516a03f
to
fcc7ce2
Compare
fcc7ce2
to
46e4643
Compare
…//github.com/cypress-io/cypress into renovate/npm-systeminformation-vulnerability
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like all good fix updates
cypress
|
Project |
cypress
|
Branch Review |
renovate/npm-systeminformation-vulnerability
|
Run status |
|
Run duration | 19m 20s |
Commit |
|
Committer | Jennifer Shehane |
View all properties for this run ↗︎ |
Test results | |
---|---|
|
0
|
|
8
|
|
1101
|
|
0
|
|
26543
|
View all changes introduced in this branch ↗︎ |
UI Coverage
45.11%
|
|
---|---|
|
186
|
|
157
|
Accessibility
97.71%
|
|
---|---|
|
4 critical
8 serious
2 moderate
2 minor
|
|
110
|
This PR contains the following updates:
5.22.8
->5.23.8
GitHub Vulnerability Alerts
CVE-2024-56334
Summary
The SSID is not sanitized when before it is passed as a parameter to cmd.exe in the
getWindowsIEEE8021x
function. This means that malicious content in the SSID can be executed as OS commands.Details
I have exploited this vulnerability in a Windows service using version 5.22.11 of the module, to escalate privileges (in an environment where I am authorized to do so). However, as far as I can see from the code, it is still present in master branch at time of writing, on line 403/404 of network.js.
The SSID is obtained from
netsh wlan show interface ...
ingetWindowsWirelessIfaceSSID
, and then passed tocmd.exe /d /s /c "netsh wlan show profiles ...
ingetWindowsIEEE8021x
, without sanitization.PoC
First, the command injection payload should be included in the connected Wi-Fi SSID. For example create hotspot on mobile phone or other laptop, set SSID to payload, connect to it with victim Windows system. Two example SSID's to demonstrate exploitation are below.
Demonstration to run ping command indefinitely:
Run executable with privileges of the user in which vulnerable function is executed. Chosen executable should should be placed in (assuming system drive is C):
C:\a\a.exe
.Then, the vulnerable function can be executed on the victim system, for example, using:
Now the chosen command,
PING.exe
ora.exe
will be run through the cmd.exe command line.Impact
This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation.
Release Notes
sebhildebrandt/systeminformation (systeminformation)
v5.23.8
Compare Source
v5.23.6
Compare Source
v5.23.5
Compare Source
v5.23.4
Compare Source
v5.23.3
Compare Source
v5.23.2
Compare Source
v5.23.1
Compare Source
v5.23.0
Compare Source
v5.22.11
Compare Source
v5.22.10
Compare Source
v5.22.9
Compare Source
Configuration
📅 Schedule: Branch creation - "" in timezone America/New_York, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.