Closed mend-for-github-com[bot] closed 3 years ago
lodash-3.10.1.tgz
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: loggly-jslogger/package.json
Path to vulnerable library: loggly-jslogger/node_modules/lodash/package.json
Dependency Hierarchy: - grunt-1.0.1.tgz (Root Library) - grunt-legacy-log-1.0.0.tgz - :x: **lodash-3.10.1.tgz** (Vulnerable Library)
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.3.0.tgz
Path to vulnerable library: loggly-jslogger/node_modules/grunt-legacy-util/node_modules/lodash/package.json,loggly-jslogger/node_modules/grunt-legacy-log-utils/node_modules/lodash/package.json
Dependency Hierarchy: - grunt-1.0.1.tgz (Root Library) - grunt-legacy-util-1.0.0.tgz - :x: **lodash-4.3.0.tgz** (Vulnerable Library)
Found in HEAD commit: 3247b5841e5a8923baf2e98a1914570b38eadd97
Found in base branch: master
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
Publish Date: 2020-07-15
URL: CVE-2020-8203
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1523
Release Date: 2020-07-23
Fix Resolution: lodash - 4.17.19
The vulnerability was fixed in this PR https://github.com/loggly/loggly-jslogger/pull/80/files
CVE-2020-8203 - High Severity Vulnerability
Vulnerable Libraries - lodash-3.10.1.tgz, lodash-4.3.0.tgz
lodash-3.10.1.tgz
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: loggly-jslogger/package.json
Path to vulnerable library: loggly-jslogger/node_modules/lodash/package.json
Dependency Hierarchy: - grunt-1.0.1.tgz (Root Library) - grunt-legacy-log-1.0.0.tgz - :x: **lodash-3.10.1.tgz** (Vulnerable Library)
lodash-4.3.0.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.3.0.tgz
Path to dependency file: loggly-jslogger/package.json
Path to vulnerable library: loggly-jslogger/node_modules/grunt-legacy-util/node_modules/lodash/package.json,loggly-jslogger/node_modules/grunt-legacy-log-utils/node_modules/lodash/package.json
Dependency Hierarchy: - grunt-1.0.1.tgz (Root Library) - grunt-legacy-util-1.0.0.tgz - :x: **lodash-4.3.0.tgz** (Vulnerable Library)
Found in HEAD commit: 3247b5841e5a8923baf2e98a1914570b38eadd97
Found in base branch: master
Vulnerability Details
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
Publish Date: 2020-07-15
URL: CVE-2020-8203
CVSS 3 Score Details (7.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1523
Release Date: 2020-07-23
Fix Resolution: lodash - 4.17.19