NodeJS/lodash/4.17.16
Lodash modular utilities.
https://www.npmjs.com/package/lodash
MIT
5 Security Vulnerabilities
Regular Expression Denial of Service (ReDoS) in lodash
- https://nvd.nist.gov/vuln/detail/CVE-2020-28500
- https://github.com/lodash/lodash/pull/5065
- https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7
- https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8
- https://security.netapp.com/advisory/ntap-20210312-0006/
- https://snyk.io/vuln/SNYK-JS-LODASH-1018905
- https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/advisories/GHSA-29mw-wpgm-hmr9
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://github.com/lodash/lodash/commit/c4847ebe7d14540bb28a8b932a9ce1b9ecbfee1a
- https://security.netapp.com/advisory/ntap-20210312-0006
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2020-28500.yml
- https://github.com/github/advisory-database/pull/6139
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
Steps to reproduce (provided by reporter Liyuan Chen): ```js var lo = require('lodash');
function buildblank(n) { var ret = 1
for (var i = 0; i < n; i++) { ret += " } return ret +
1"; } var s = buildblank(50000) var time0 = Date.now(); lo.trim(s) var timecost0 = Date.now() - time0; console.log("timecost0: + time_cost0); var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log(
timecost1: " + timecost1); var time2 = Date.now(); lo.trimEnd(s); var timecost2 = Date.now() - time2; console.log("timecost2: " + time_cost2); ```
Command Injection in lodash
- https://nvd.nist.gov/vuln/detail/CVE-2021-23337
- https://github.com/advisories/GHSA-35jh-r3h4-6jhm
- https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
- https://security.netapp.com/advisory/ntap-20210312-0006/
- https://snyk.io/vuln/SNYK-JS-LODASH-1040724
- https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851
- https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
- https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://security.netapp.com/advisory/ntap-20210312-0006
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2021-23337.yml
lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Withdrawn: Arbitrary code execution in lodash
Withdrawn
GitHub has chosen to publish this CVE as a withdrawn advisory due to it not being a security issue. See this issue for more details.
CVE description
"** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input.
Prototype Pollution in lodash
- https://nvd.nist.gov/vuln/detail/CVE-2020-8203
- https://github.com/advisories/GHSA-p6mc-m468-83gw
- https://github.com/lodash/lodash/issues/4744
- https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12
- https://www.npmjs.com/advisories/1523
- https://hackerone.com/reports/712065
- https://security.netapp.com/advisory/ntap-20200724-0006/
- https://github.com/lodash/lodash/issues/4874
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/github/advisory-database/pull/2884
- https://hackerone.com/reports/864701
- https://github.com/lodash/lodash/wiki/Changelog#v41719
- https://web.archive.org/web/20210914001339/https://github.com/lodash/lodash/issues/4744
- https://security.netapp.com/advisory/ntap-20200724-0006
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2020-8203.yml
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions pick, set, setWith, update, updateWith, and zipObjectDeep allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires manipulating objects based on user-provided property values or arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
Allocation of Resources Without Limits or Throttling
Prototype pollution attack (lodash)
114 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 4.17.21 | MIT | 1 | 2021-02-20 - 15:42 | almost 5 years |
| 4.17.20 | MIT | 3 | 2020-08-13 - 16:53 | over 5 years |
| 4.17.19 | MIT | 3 | 2020-07-08 - 17:14 | over 5 years |
| 4.17.18 | MIT | 5 | 2020-07-08 - 16:07 | over 5 years |
| 4.17.17 | MIT | 5 | 2020-07-08 - 12:08 | over 5 years |
| 4.17.16 | MIT | 5 | 2020-07-08 - 10:50 | over 5 years |
| 4.17.15 | MIT | 5 | 2019-07-19 - 02:28 | over 6 years |
| 4.17.14 | MIT | 4 | 2019-07-10 - 15:44 | over 6 years |
| 4.17.13 | MIT | 4 | 2019-07-09 - 22:24 | over 6 years |
| 4.17.12 | MIT | 4 | 2019-07-09 - 21:07 | over 6 years |
| 4.17.11 | MIT | 5 | 2018-09-12 - 18:32 | over 7 years |
| 4.17.10 | MIT | 8 | 2018-04-24 - 18:07 | over 7 years |
| 4.17.9 | MIT | 8 | 2018-04-24 - 17:44 | over 7 years |
| 4.17.5 | MIT | 8 | 2018-02-04 - 00:34 | almost 8 years |
| 4.17.4 | MIT | 10 | 2016-12-31 - 22:33 | almost 9 years |
| 4.17.3 | MIT | 10 | 2016-12-24 - 14:25 | almost 9 years |
| 4.17.2 | MIT | 10 | 2016-11-16 - 07:21 | about 9 years |
| 4.17.1 | MIT | 10 | 2016-11-15 - 07:03 | about 9 years |
| 4.17.0 | MIT | 10 | 2016-11-14 - 07:00 | about 9 years |
| 4.16.6 | MIT | 10 | 2016-11-01 - 06:38 | about 9 years |
| 4.16.5 | MIT | 10 | 2016-10-31 - 06:49 | about 9 years |
| 4.16.4 | MIT | 10 | 2016-10-06 - 15:13 | about 9 years |
| 4.16.3 | MIT | 10 | 2016-10-03 - 16:43 | about 9 years |
| 4.16.2 | MIT | 10 | 2016-09-26 - 03:11 | about 9 years |
| 4.16.1 | MIT | 10 | 2016-09-20 - 16:59 | over 9 years |
| 4.16.0 | MIT | 10 | 2016-09-19 - 14:59 | over 9 years |
| 4.15.0 | MIT | 10 | 2016-08-12 - 14:39 | over 9 years |
| 4.14.2 | MIT | 10 | 2016-08-08 - 15:35 | over 9 years |
| 4.14.1 | MIT | 10 | 2016-07-29 - 14:49 | over 9 years |
| 4.14.0 | MIT | 10 | 2016-07-24 - 18:40 | over 9 years |
| 4.13.1 | MIT | 10 | 2016-05-23 - 15:59 | over 9 years |
| 4.13.0 | MIT | 10 | 2016-05-23 - 05:07 | over 9 years |
| 4.12.0 | MIT | 10 | 2016-05-08 - 19:25 | over 9 years |
| 4.11.2 | MIT | 10 | 2016-05-02 - 15:01 | over 9 years |
| 4.11.1 | MIT | 10 | 2016-04-14 - 07:21 | over 9 years |
| 4.11.0 | MIT | 10 | 2016-04-13 - 15:32 | over 9 years |
| 4.10.0 | MIT | 10 | 2016-04-11 - 14:43 | over 9 years |
| 4.9.0 | MIT | 10 | 2016-04-08 - 15:22 | over 9 years |
| 4.8.2 | MIT | 10 | 2016-04-05 - 02:15 | over 9 years |
| 4.8.1 | MIT | 10 | 2016-04-04 - 15:43 | over 9 years |
| 4.8.0 | MIT | 10 | 2016-04-04 - 14:54 | over 9 years |
| 4.7.0 | MIT | 10 | 2016-03-31 - 15:46 | over 9 years |
| 4.6.1 | MIT | 9 | 2016-03-02 - 18:09 | almost 10 years |
| 4.6.0 | MIT | 9 | 2016-03-02 - 03:24 | almost 10 years |
| 4.5.1 | MIT | 9 | 2016-02-22 - 06:42 | almost 10 years |
| 4.5.0 | MIT | 9 | 2016-02-17 - 08:39 | almost 10 years |
| 4.4.0 | MIT | 9 | 2016-02-16 - 07:10 | almost 10 years |
| 4.3.0 | MIT | 9 | 2016-02-08 - 08:57 | almost 10 years |
| 4.2.1 | MIT | 9 | 2016-02-03 - 16:00 | almost 10 years |
| 4.2.0 | MIT | 9 | 2016-02-02 - 08:50 | almost 10 years |
