updated docs
This commit is contained in:
parent
af9b8a522e
commit
d84fea93dc
@ -45,7 +45,7 @@
|
|||||||
<div class="text">
|
<div class="text">
|
||||||
<h2>Command Injection Vulnerability</h2>
|
<h2>Command Injection Vulnerability</h2>
|
||||||
<p><span class="bold">Affected versions:</span>
|
<p><span class="bold">Affected versions:</span>
|
||||||
< 5.6.3 and < 4.34.13<br>
|
< 5.6.3 and < 4.34.16<br>
|
||||||
<span class="bold">Date:</span> 2021-03-14<br>
|
<span class="bold">Date:</span> 2021-03-14<br>
|
||||||
<span class="bold">CVE indentifier</span> -
|
<span class="bold">CVE indentifier</span> -
|
||||||
</p>
|
</p>
|
||||||
@ -54,7 +54,7 @@
|
|||||||
<p>We had an issue that there was a possibility to perform a potential command injection possibility by passing a manipulated string prototype as a parameter to the following functions. Affected commands: <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span>.</p>
|
<p>We had an issue that there was a possibility to perform a potential command injection possibility by passing a manipulated string prototype as a parameter to the following functions. Affected commands: <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span>.</p>
|
||||||
|
|
||||||
<h4>Patch</h4>
|
<h4>Patch</h4>
|
||||||
<p>Problem was fixed with additional parameter checking. Please upgrade to version >= 5.6.3 (or >= 4.34.13 if you are using version 4).</p>
|
<p>Problem was fixed with additional parameter checking. Please upgrade to version >= 5.6.3 (or >= 4.34.16 if you are using version 4).</p>
|
||||||
|
|
||||||
<h4>Workarround</h4>
|
<h4>Workarround</h4>
|
||||||
<p>If you cannot upgrade, be sure to check or sanitize parameter strings that are passed to <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span> (string only)</p>
|
<p>If you cannot upgrade, be sure to check or sanitize parameter strings that are passed to <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span> (string only)</p>
|
||||||
|
|||||||
@ -83,6 +83,11 @@
|
|||||||
</tr>
|
</tr>
|
||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<th scope="row">4.34.16</th>
|
||||||
|
<td>2021-03-14</td>
|
||||||
|
<td><span class="code">sanitizeShellString()</span> improvements</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<th scope="row">4.34.15</th>
|
<th scope="row">4.34.15</th>
|
||||||
<td>2020-02-23</td>
|
<td>2020-02-23</td>
|
||||||
|
|||||||
@ -165,12 +165,12 @@
|
|||||||
<body>
|
<body>
|
||||||
<header class="bg-image-full">
|
<header class="bg-image-full">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<a href="security.html" class="recommendation">Security advisory:<br>Update to v4.34.11</a>
|
<a href="security.html" class="recommendation">Security advisory:<br>Update to v4.34.16</a>
|
||||||
<img class="logo" src="assets/logo.png">
|
<img class="logo" src="assets/logo.png">
|
||||||
<div class="title">systeminformation </div>
|
<div class="title">systeminformation </div>
|
||||||
<div class="subtitle"><span id="typed"></span> </div>
|
<div class="subtitle"><span id="typed"></span> </div>
|
||||||
<div class="version larger">Version 4 documentation</div>
|
<div class="version larger">Version 4 documentation</div>
|
||||||
<div class="version">Current Version: <span id="version">4.34.15</span></div>
|
<div class="version">Current Version: <span id="version">4.34.16</span></div>
|
||||||
<button class="btn btn-light" onclick="location.href='https://github.com/sebhildebrandt/systeminformation'">View on Github <i class=" fab fa-github"></i></button>
|
<button class="btn btn-light" onclick="location.href='https://github.com/sebhildebrandt/systeminformation'">View on Github <i class=" fab fa-github"></i></button>
|
||||||
</div>
|
</div>
|
||||||
<div class="down">
|
<div class="down">
|
||||||
|
|||||||
@ -42,6 +42,23 @@
|
|||||||
<div class="col-12 sectionheader">
|
<div class="col-12 sectionheader">
|
||||||
<div class="title">Security Advisories</div>
|
<div class="title">Security Advisories</div>
|
||||||
<div class="text">
|
<div class="text">
|
||||||
|
<h2>Command Injection Vulnerability</h2>
|
||||||
|
<p><span class="bold">Affected versions:</span>
|
||||||
|
< 4.34.13<br>
|
||||||
|
<span class="bold">Date:</span> 2021-03-14<br>
|
||||||
|
<span class="bold">CVE indentifier</span> -
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<h4>Impact</h4>
|
||||||
|
<p>We had an issue that there was a possibility to perform a potential command injection possibility by passing a manipulated string prototype as a parameter to the following functions. Affected commands: <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span>.</p>
|
||||||
|
|
||||||
|
<h4>Patch</h4>
|
||||||
|
<p>Problem was fixed with additional parameter checking. Please upgrade to version >= 4.34.13 if you are using version 4.</p>
|
||||||
|
|
||||||
|
<h4>Workarround</h4>
|
||||||
|
<p>If you cannot upgrade, be sure to check or sanitize parameter strings that are passed to <span class="code">inetLatency()</span>, <span class="code">inetChecksite()</span>, <span class="code">services()</span>, <span class="code">processLoad()</span> (string only)</p>
|
||||||
|
<hr>
|
||||||
|
<br>
|
||||||
<h2>Insufficient File Scheme Validation</h2>
|
<h2>Insufficient File Scheme Validation</h2>
|
||||||
<p><span class="bold">Affected versions:</span>
|
<p><span class="bold">Affected versions:</span>
|
||||||
4.34.12<br>
|
4.34.12<br>
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user