CVE-2019-10744 Affecting node-lodash package, versions <4.17.15+dfsg-1


0.0
critical

Snyk CVSS

    Attack Complexity Low
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 1.48% (87th percentile)
Expand this section
NVD
9.1 critical
Expand this section
Red Hat
9.1 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIANUNSTABLE-NODELODASH-455504
  • published 26 Jul 2019
  • disclosed 26 Jul 2019

How to fix?

Upgrade Debian:unstable node-lodash to version 4.17.15+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-lodash package and not the node-lodash package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.