Severity
9.1CRITICAL
EPSS
3.3%
top 12.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 26
Latest updateJan 15

Description

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages26 packages

npmlodash.defaultsdeep< 4.6.1
npmlodash< 4.17.12
npmlodash-es< 4.17.14
npmlodash-amd< 4.17.13
RubyGemslodash-rails< 4.17.12

Patches

🔴Vulnerability Details

4
OSV
CVE-2019-10744: Versions of lodash lower than 42019-07-26
CVEList
CVE-2019-10744: Versions of lodash lower than 42019-07-25
GHSA
Prototype Pollution in lodash2019-07-10
OSV
Prototype Pollution in lodash2019-07-10

📋Vendor Advisories

3
Oracle
Oracle Oracle Financial Services Applications Risk Matrix: Core (Lodash) — CVE-2019-107442021-01-15
Red Hat
nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties2019-08-09
Debian
CVE-2019-10744: node-lodash - Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The...2019

💬Community

2
Bugzilla
CVE-2019-10744 nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties2019-08-09
Bugzilla
CVE-2019-10744 nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties [epel-all]2019-08-09