Skip to content

Comments

fix(deps): update dependency lodash to v4.17.21 [security]#19

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-vulnerability
Open

fix(deps): update dependency lodash to v4.17.21 [security]#19
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-lodash-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Aug 10, 2019

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
lodash (source) 4.17.4 -> 4.17.21 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2019-10744

Versions of lodash before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep allows a malicious user to modify the prototype of Object via {constructor: {prototype: {...}}} causing the addition or modification of an existing property that will exist on all objects.

Recommendation

Update to version 4.17.12 or later.

CVE-2019-1010266

lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.

CVE-2021-23337

lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

CVE-2018-3721

Versions of lodash before 4.17.5 are vulnerable to prototype pollution.

The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object via __proto__ causing the addition or modification of an existing property that will exist on all objects.

Recommendation

Update to version 4.17.5 or later.

CVE-2018-16487

Versions of lodash before 4.17.11 are vulnerable to prototype pollution.

The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object via {constructor: {prototype: {...}}} causing the addition or modification of an existing property that will exist on all objects.

Recommendation

Update to version 4.17.11 or later.

CVE-2020-28500

All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

Steps to reproduce (provided by reporter Liyuan Chen):

var lo = require('lodash');

function build_blank(n) {
    var ret = "1"
    for (var i = 0; i < n; i++) {
        ret += " "
    }
    return ret + "1";
}
var s = build_blank(50000) var time0 = Date.now();
lo.trim(s) 
var time_cost0 = Date.now() - time0;
console.log("time_cost0: " + time_cost0);
var time1 = Date.now();
lo.toNumber(s) var time_cost1 = Date.now() - time1;
console.log("time_cost1: " + time_cost1);
var time2 = Date.now();
lo.trimEnd(s);
var time_cost2 = Date.now() - time2;
console.log("time_cost2: " + time_cost2);

CVE-2020-8203

Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions pick, set, setWith, update, updateWith, and zipObjectDeep allow a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires manipulating objects based on user-provided property values or arrays.

This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.


Release Notes

lodash/lodash (lodash)

v4.17.21

Compare Source

v4.17.20

Compare Source

v4.17.19

v4.17.16

Compare Source

v4.17.15

Compare Source

v4.17.14

Compare Source

v4.17.13

Compare Source

v4.17.12

Compare Source

v4.17.11

Compare Source

v4.17.10

Compare Source

v4.17.9

Compare Source

v4.17.5

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title fix(deps): update dependency lodash to v4.17.13 [security] fix(deps): update dependency lodash to v4.17.12 [security] Dec 14, 2019
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 118e969 to 840c809 Compare July 1, 2020 22:50
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 840c809 to cb1658d Compare August 23, 2020 14:00
@renovate renovate bot changed the title fix(deps): update dependency lodash to v4.17.12 [security] fix(deps): update dependency lodash to v4.17.19 [security] Aug 23, 2020
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from cb1658d to 654cef4 Compare April 26, 2021 17:45
@renovate renovate bot changed the title fix(deps): update dependency lodash to v4.17.19 [security] fix(deps): update dependency lodash to v4.17.21 [security] May 9, 2021
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 654cef4 to 6c25668 Compare April 25, 2022 00:41
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 6c25668 to e40fa5a Compare November 14, 2022 19:37
@renovate renovate bot changed the title fix(deps): update dependency lodash to v4.17.21 [security] Update dependency lodash to v4.17.21 [SECURITY] Dec 17, 2022
@renovate renovate bot changed the title Update dependency lodash to v4.17.21 [SECURITY] fix(deps): update dependency lodash to v4.17.21 [security] Dec 17, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants