You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
mend-bolt-for-githubbot
changed the title
CVE-2019-10744 (High) detected in lodash-1.0.2.tgz
CVE-2019-10744 (High) detected in lodash.template-3.6.2.tgz, lodash-1.0.2.tgz
Nov 30, 2021
CVE-2019-10744 - High Severity Vulnerability
lodash.template-3.6.2.tgz
The modern build of lodash’s `_.template` as a module.
Library home page: https://registry.npmjs.org/lodash.template/-/lodash.template-3.6.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/lodash.template/package.json
Dependency Hierarchy:
lodash-1.0.2.tgz
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
Found in HEAD commit: dc2f1b08ce7e752558190e9785094a6975b614fd
Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
Publish Date: 2019-07-26
URL: CVE-2019-10744
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-jf85-cpcp-j695
Release Date: 2019-07-26
Fix Resolution (lodash.template): 4.5.0
Direct dependency fix Resolution (gulp): 4.0.0
Fix Resolution (lodash): 4.17.12
Direct dependency fix Resolution (gulp): 4.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: