First published: Thu Feb 15 2018(Updated: )
Affected versions of this package are vulnerable to Prototype Pollution. The utilities function allows modification of the Object prototype. If an attacker can control part of the structure passed to this function, they could add or modify an existing property leading to potential denial of service. Upstream patch: <a href="https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a">https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a</a> References: <a href="https://snyk.io/vuln/npm:lodash:20180130">https://snyk.io/vuln/npm:lodash:20180130</a> <a href="https://hackerone.com/reports/310443">https://hackerone.com/reports/310443</a>
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/lodash | <4.17.5 | 4.17.5 |
npm/lodash | <4.17.5 | 4.17.5 |
Lodash Lodash Node.js | <4.17.5 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp System Manager | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Node.js lodash vulnerability is CVE-2018-3721.
The severity level of CVE-2018-3721 is medium (5.3).
The vulnerability in Node.js lodash module allows a remote attacker to bypass security restrictions by modifying the prototype of 'Object' via '__proto__', causing the addition or modification of an existing property.
The affected software for CVE-2018-3721 includes the lodash node module before version 4.17.5 and IBM Security Verify Governance before version 10.0.
To fix the vulnerability in Node.js lodash module, update the lodash package to version 4.17.5 or higher.