CVE-2019-10744: Prototype Pollution in lodash
(updated )
Versions of lodash lower than are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
References
- access.redhat.com/errata/RHSA-2019:3024
- github.com/advisories/GHSA-jf85-cpcp-j695
- github.com/lodash/lodash/pull/4336
- nvd.nist.gov/vuln/detail/CVE-2019-10744
- security.netapp.com/advisory/ntap-20191004-0005/
- snyk.io/vuln/SNYK-JS-LODASH-450202
- support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS
- www.npmjs.com/advisories/1065
- www.oracle.com/security-alerts/cpujan2021.html
- www.oracle.com/security-alerts/cpuoct2020.html
Detect and mitigate CVE-2019-10744 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →