CVE-2018-16487: Prototype Pollution in lodash
(updated )
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are ‘defaultsDeep’, ‘merge’, and ‘mergeWith’ which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
References
- github.com/advisories/GHSA-4xc9-xhrj-v574
- github.com/lodash/lodash/commit/90e6199a161b6445b01454517b40ef65ebecd2ad
- github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-16487.yml
- hackerone.com/reports/380873
- nvd.nist.gov/vuln/detail/CVE-2018-16487
- security.netapp.com/advisory/ntap-20190919-0004
Code Behaviors & Features
Detect and mitigate CVE-2018-16487 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →