First published: Wed Jul 10 2019(Updated: )
A Prototype Pollution vulnerability was found in lodash. Calling certain methods with untrusted JSON could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jaeger | <0:v1.13.1.redhat7-1.el7 | 0:v1.13.1.redhat7-1.el7 |
redhat/kiali | <0:v1.0.11.redhat1-1.el7 | 0:v1.0.11.redhat1-1.el7 |
redhat/servicemesh-grafana | <0:6.2.2-36.el8 | 0:6.2.2-36.el8 |
redhat/ovirt-web-ui | <0:1.6.0-1.el7e | 0:1.6.0-1.el7e |
redhat/lodash | <4.17.12 | 4.17.12 |
npm/lodash.defaultsdeep | <4.6.1 | 4.6.1 |
npm/lodash-amd | <4.17.13 | 4.17.13 |
npm/lodash-es | <4.17.14 | 4.17.14 |
npm/lodash | <4.17.12 | 4.17.12 |
Lodash Lodash Node.js | <4.17.12 | |
NetApp Service Level Manager | ||
Red Hat Enterprise Virtualization Manager | =4.3 | |
Oracle Banking Extensibility Workbench | =14.3.0 | |
Oracle Banking Extensibility Workbench | =14.4.0 | |
F5 Access Policy Manager | >=12.1.0<12.1.5.2 | |
F5 Access Policy Manager | >=13.1.0<13.1.3.4 | |
F5 Access Policy Manager | >=14.1.0<14.1.2.5 | |
F5 Access Policy Manager | >=15.0.0<15.0.1.4 | |
F5 Access Policy Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.3 | |
F5 BIG-IP Analytics | >=14.1.0<=14.1.2 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.3 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.0.2 | |
f5 big-ip application acceleration manager | >=12.1.0<12.1.5.2 | |
f5 big-ip application acceleration manager | >=13.1.0<13.1.3.4 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.2.5 | |
f5 big-ip application acceleration manager | >=15.0.0<15.0.1.4 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.0.2 | |
F5 Application Security Manager | >=12.1.0<12.1.5.2 | |
F5 Application Security Manager | >=13.1.0<13.1.3.4 | |
F5 Application Security Manager | >=14.1.0<14.1.2.5 | |
F5 Application Security Manager | >=15.0.0<15.0.1.4 | |
F5 Application Security Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Application Visibility and Reporting | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Application Visibility and Reporting | >=13.1.0<=13.1.3 | |
F5 BIG-IP Application Visibility and Reporting | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Application Visibility and Reporting | >=15.1.0<15.1.1 | |
f5 big-ip domain name system | >=12.1.0<12.1.5.2 | |
f5 big-ip domain name system | >=13.1.0<13.1.3.4 | |
f5 big-ip domain name system | >=14.1.0<14.1.2.5 | |
f5 big-ip domain name system | >=15.0.0<15.0.1.4 | |
f5 big-ip domain name system | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Edge Gateway | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Edge Gateway | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Edge Gateway | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Edge Gateway | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Edge Gateway | >=15.1.0<15.1.0.2 | |
F5 BIG-IP fraud protection services | >=12.1.0<12.1.5.2 | |
F5 BIG-IP fraud protection services | >=13.1.0<13.1.3.4 | |
F5 BIG-IP fraud protection services | >=14.1.0<14.1.2.5 | |
F5 BIG-IP fraud protection services | >=15.0.0<15.0.1.4 | |
F5 BIG-IP fraud protection services | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP | >=12.1.0<12.1.5.2 | |
F5 BIG-IP | >=13.1.0<13.1.3.4 | |
F5 BIG-IP | >=14.1.0<14.1.2.5 | |
F5 BIG-IP | >=15.0.0<15.0.1.4 | |
F5 BIG-IP | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.0.2 | |
F5 BIG-IP WebAccelerator | >=12.1.0<12.1.5.2 | |
F5 BIG-IP WebAccelerator | >=13.1.0<13.1.3.4 | |
F5 BIG-IP WebAccelerator | >=14.1.0<14.1.2.5 | |
F5 BIG-IP WebAccelerator | >=15.0.0<15.0.1.4 | |
F5 BIG-IP WebAccelerator | >=15.1.0<15.1.0.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =5.4.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =7.0.0 | |
F5 iWorkflow | =2.3.0 | |
NetApp Active IQ Unified Manager | ||
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10744 is a vulnerability known as Prototype Pollution that affects versions of lodash before 4.17.12.
CVE-2019-10744 allows a malicious user to modify the prototype of Object via defaultsDeep in lodash, leading to the addition or modification of properties that will exist on all objects.
CVE-2019-10744 has a critical severity rating.
Versions of lodash lower than 4.17.12 are affected by CVE-2019-10744.
To fix CVE-2019-10744, update lodash to version 4.17.12 or higher.