-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2020-28500 - Medium Severity Vulnerability
Vulnerable Library - lodash-4.17.10.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash/package.json
Dependency Hierarchy:
- lerna-3.2.1.tgz (Root Library)
- add-3.2.0.tgz
- command-3.1.3.tgz
- ❌ lodash-4.17.10.tgz (Vulnerable Library)
- command-3.1.3.tgz
- add-3.2.0.tgz
Found in HEAD commit: 540c99a1154755210d6564a50420589ebbf7f97c
Found in base branch: master
Vulnerability Details
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
Publish Date: 2021-02-15
URL: CVE-2020-28500
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-29mw-wpgm-hmr9
Release Date: 2021-02-15
Fix Resolution: lodash - 4.17.21,lodash-es - 4.17.21,lodash-rails - 4.17.21