CVE-2019-1010266: Regular Expression Denial of Service (ReDoS) in lodash
(updated )
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
References
- github.com/advisories/GHSA-x5rq-j2xg-h7qm
- github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347
- github.com/lodash/lodash/issues/3359
- github.com/lodash/lodash/wiki/Changelog
- github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2019-1010266.yml
- nvd.nist.gov/vuln/detail/CVE-2019-1010266
- security.netapp.com/advisory/ntap-20190919-0004
- snyk.io/vuln/SNYK-JS-LODASH-73639
Code Behaviors & Features
Detect and mitigate CVE-2019-1010266 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →