This repository has been archived by the owner on Jan 8, 2021. It is now read-only.
WS-2020-0070 (High) detected in lodash-4.17.5.tgz, lodash-3.10.1.tgz #174
Labels
security vulnerability
Security vulnerability detected by WhiteSource
WS-2020-0070 - High Severity Vulnerability
lodash-4.17.5.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /tmp/ws-scm/recursos.osweekends.com/client/package.json
Path to vulnerable library: /tmp/ws-scm/recursos.osweekends.com/client/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-3.10.1.tgz
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /tmp/ws-scm/recursos.osweekends.com/client/package.json
Path to vulnerable library: /tmp/ws-scm/recursos.osweekends.com/client/node_modules/karma-coverage/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: 62d2fd7fb5555001243fa0fa126216413fb99e9f
All versions of lodash are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability may lead to Denial of Service or Code Execution.
Publish Date: 2020-04-28
URL: WS-2020-0070
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: