First published: Mon Feb 15 2021(Updated: )
A flaw was found in nodejs-lodash. A Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions is possible.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cockpit-ovirt | <0:0.15.1-2.el8e | 0:0.15.1-2.el8e |
redhat/ovirt-engine-ui-extensions | <0:1.2.6-1.el8e | 0:1.2.6-1.el8e |
redhat/ovirt-web-ui | <0:1.6.9-1.el8e | 0:1.6.9-1.el8e |
npm/lodash.trim | <=4.5.1 | |
npm/lodash.trimend | <=4.5.1 | |
npm/lodash-es | <4.17.21 | 4.17.21 |
npm/lodash | <4.17.21 | 4.17.21 |
redhat/nodejs-lodash | <4.17.21 | 4.17.21 |
Lodash Lodash Node.js | <4.17.21 | |
Oracle Banking Corporate Lending Process Management | =14.2.0 | |
Oracle Banking Corporate Lending Process Management | =14.3.0 | |
Oracle Banking Corporate Lending Process Management | =14.5.0 | |
Oracle Banking Credit Facilities Process Management | =14.2.0 | |
Oracle Banking Credit Facilities Process Management | =14.3.0 | |
Oracle Banking Credit Facilities Process Management | =14.5.0 | |
Oracle Banking Extensibility Workbench | =14.2.0 | |
Oracle Banking Extensibility Workbench | =14.3.0 | |
Oracle Banking Extensibility Workbench | =14.5.0 | |
Oracle Banking Supply Chain Finance | =14.2.0 | |
Oracle Banking Supply Chain Finance | =14.3.0 | |
Oracle Banking Supply Chain Finance | =14.5.0 | |
Oracle Banking Trade Finance Process Management | =14.2.0 | |
Oracle Banking Trade Finance Process Management | =14.3.0 | |
Oracle Banking Trade Finance Process Management | =14.5.0 | |
Oracle Communications Cloud Native Core Policy | =1.11.0 | |
Oracle Communications Design Studio | =7.4.2 | |
Oracle Communications Services Gatekeeper | =7.0 | |
Oracle Communications Session Border Controller | =8.4 | |
Oracle Communications Session Border Controller | =9.0 | |
Oracle Enterprise Communications Broker | =3.2.0 | |
Oracle Enterprise Communications Broker | =3.3.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.3.0 | |
Oracle Health Sciences Data Management Workbench | =2.5.2.1 | |
Oracle Health Sciences Data Management Workbench | =3.0.0.0 | |
Oracle Jd Edwards Enterpriseone Tools | <9.2.6.1 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
Oracle Primavera Gateway | >=17.12.0<=17.12.11 | |
Oracle Primavera Gateway | >=18.8.0<=18.8.12 | |
Oracle Primavera Gateway | >=19.12.0<=19.12.11 | |
Oracle Primavera Gateway | >=20.12.0<=20.12.7 | |
Oracle Primavera Unifier | >=17.7<=17.12 | |
Oracle Primavera Unifier | =18.8 | |
Oracle Primavera Unifier | =19.12 | |
Oracle Primavera Unifier | =20.12 | |
Oracle Retail Customer Management and Segmentation Foundation | =19.0 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-28500 is a vulnerability in nodejs-lodash that allows for Regular Expression Denial of Service (ReDoS) attacks via the toNumber, trim, and trimEnd functions.
CVE-2020-28500 has a severity rating of 7.5, which is considered high.
All versions of package lodash prior to 4.17.21 are vulnerable to CVE-2020-28500, including the following software versions: cockpit-ovirt 0:0.15.1-2.el8e, ovirt-engine-ui-extensions 0:1.2.6-1.el8e, ovirt-web-ui 0:1.6.9-1.el8e, nodejs-lodash 4.17.21, lodash.trim 4.17.21, lodash.trimend 4.17.21, lodash-es 4.17.21, and lodash 4.17.21.
To fix CVE-2020-28500, you should update the affected software packages to version 4.17.21 or later.
You can find more information about CVE-2020-28500 at the following references: IBM X-Force Exchange (https://exchange.xforce.ibmcloud.com/vulnerabilities/196972), IBM Support (https://www.ibm.com/support/pages/node/6570957), CVE website (https://www.cve.org/CVERecord?id=CVE-2020-28500), NVD (https://nvd.nist.gov/vuln/detail/CVE-2020-28500), and Snyk (https://snyk.io/vuln/SNYK-JS-LODASH-1018905).