First published: Mon Feb 15 2021(Updated: )
`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cockpit-ovirt | <0:0.15.1-2.el8e | 0:0.15.1-2.el8e |
redhat/ovirt-engine-ui-extensions | <0:1.2.6-1.el8e | 0:1.2.6-1.el8e |
redhat/ovirt-web-ui | <0:1.6.9-1.el8e | 0:1.6.9-1.el8e |
redhat/nodejs-lodash | <4.17.21 | 4.17.21 |
npm/lodash-template | <=1.0.0 | |
npm/lodash.template | <=4.5.0 | |
npm/lodash-es | <4.17.21 | 4.17.21 |
npm/lodash | <4.17.21 | 4.17.21 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Lodash Lodash Node.js | <4.17.21 | |
Oracle Banking Corporate Lending Process Management | =14.2.0 | |
Oracle Banking Corporate Lending Process Management | =14.3.0 | |
Oracle Banking Corporate Lending Process Management | =14.5.0 | |
Oracle Banking Credit Facilities Process Management | =14.2.0 | |
Oracle Banking Credit Facilities Process Management | =14.3.0 | |
Oracle Banking Credit Facilities Process Management | =14.5.0 | |
Oracle Banking Extensibility Workbench | =14.2.0 | |
Oracle Banking Extensibility Workbench | =14.3.0 | |
Oracle Banking Extensibility Workbench | =14.5.0 | |
Oracle Banking Supply Chain Finance | =14.2.0 | |
Oracle Banking Supply Chain Finance | =14.3.0 | |
Oracle Banking Supply Chain Finance | =14.5.0 | |
Oracle Banking Trade Finance Process Management | =14.2.0 | |
Oracle Banking Trade Finance Process Management | =14.3.0 | |
Oracle Banking Trade Finance Process Management | =14.5.0 | |
oracle communications Cloud native core binding support function | =1.9.0 | |
oracle communications Cloud native core policy | =1.11.0 | |
Oracle Communications Design Studio | =7.4.2.0.0 | |
Oracle Communications Services Gatekeeper | =7.0 | |
Oracle Communications Session Border Controller | =8.4 | |
Oracle Communications Session Border Controller | =9.0 | |
Oracle Enterprise Communications Broker | =3.2.0 | |
Oracle Enterprise Communications Broker | =3.3.0 | |
Oracle Financial Services Crime and Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime and Compliance Management Studio | =8.0.8.3.0 | |
Oracle Health Sciences Data Management Workbench | =2.5.2.1 | |
Oracle Health Sciences Data Management Workbench | =3.0.0.0 | |
Oracle JD Edwards EnterpriseOne Tools | <9.2.6.1 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
oracle primavera gateway | >=17.12.0<=17.12.11 | |
oracle primavera gateway | >=18.8.0<=18.8.12 | |
oracle primavera gateway | >=19.12.0<=19.12.11 | |
oracle primavera gateway | >=20.12.0<=20.12.7 | |
Oracle Primavera Unifier | >=17.7<=17.12 | |
Oracle Primavera Unifier | =18.8 | |
Oracle Primavera Unifier | =19.12 | |
Oracle Primavera Unifier | =20.12 | |
Oracle Customer Management and Segmentation Foundation | =19.0 | |
NetApp Active IQ Unified Manager | ||
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows | ||
Cloud Manager | ||
NetApp System Manager | =9.0 | |
siemens sinec ins | <1.0 | |
siemens sinec ins | =1.0 | |
siemens sinec ins | =1.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-23337 is a vulnerability in Lodash versions prior to 4.17.21 that allows command injection via the template function.
CVE-2021-23337 can allow a remote authenticated attacker to execute arbitrary commands on the system by exploiting a command injection flaw in the template.
Node.js lodash module versions prior to 4.17.21 are affected by CVE-2021-23337.
CVE-2021-23337 has a severity rating of high.
To fix the CVE-2021-23337 vulnerability, update Node.js lodash module to version 4.17.21 or later.