CVE-2019-10744: Prototype Pollution in lodash
(updated )
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
References
- access.redhat.com/errata/RHSA-2019:3024
- github.com/advisories/GHSA-jf85-cpcp-j695
- github.com/lodash/lodash/pull/4336
- github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2019-10744.yml
- nvd.nist.gov/vuln/detail/CVE-2019-10744
- security.netapp.com/advisory/ntap-20191004-0005
- snyk.io/vuln/SNYK-JS-LODASH-450202
- support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
- support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS
- www.oracle.com/security-alerts/cpujan2021.html
- www.oracle.com/security-alerts/cpuoct2020.html
Code Behaviors & Features
Detect and mitigate CVE-2019-10744 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →