Skip to content

Prototype Pollution in lodash

High severity GitHub Reviewed Published Feb 7, 2019 to the GitHub Advisory Database • Updated Nov 1, 2023

Package

npm lodash (npm)

Affected versions

< 4.17.11

Patched versions

4.17.11

Description

Versions of lodash before 4.17.11 are vulnerable to prototype pollution.

The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object via {constructor: {prototype: {...}}} causing the addition or modification of an existing property that will exist on all objects.

Recommendation

Update to version 4.17.11 or later.

References

Published to the GitHub Advisory Database Feb 7, 2019
Reviewed Jun 16, 2020
Last updated Nov 1, 2023

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(58th percentile)

Weaknesses

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.

CVE ID

CVE-2018-16487

GHSA ID

GHSA-4xc9-xhrj-v574

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy