CVE-2018-3721: Prototype Pollution in lodash
(updated )
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are ‘defaultsDeep’, ‘merge’, and ‘mergeWith’ which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
References
- github.com/advisories/GHSA-fvqr-27wr-82fm
- github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a
- github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-3721.yml
- hackerone.com/reports/310443
- nvd.nist.gov/vuln/detail/CVE-2018-3721
- security.netapp.com/advisory/ntap-20190919-0004
Code Behaviors & Features
Detect and mitigate CVE-2018-3721 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →