axios icon indicating copy to clipboard operation
axios copied to clipboard

CVE-2018-3721 (Medium) detected in multiple libraries

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 2 comments

CVE-2018-3721 - Medium Severity Vulnerability

Vulnerable Libraries - lodash-1.0.2.tgz, lodash-0.9.2.tgz, lodash-2.4.2.tgz, lodash-4.13.1.tgz, lodash-2.4.1.tgz, lodash-1.2.1.tgz, lodash-3.10.1.tgz

lodash-1.0.2.tgz

A utility library delivering consistency, customization, performance, and extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/globule/node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-contrib-watch-0.6.1.tgz (Root Library)
    • gaze-0.5.2.tgz
      • globule-0.1.0.tgz
        • :x: lodash-1.0.2.tgz (Vulnerable Library)
lodash-0.9.2.tgz

A utility library delivering consistency, customization, performance, and extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-0.9.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-0.4.5.tgz (Root Library)
    • :x: lodash-0.9.2.tgz (Vulnerable Library)
lodash-2.4.2.tgz

A utility library delivering consistency, customization, performance, & extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grunt-legacy-log-utils/node_modules/lodash/package.json,/node_modules/findup-sync/node_modules/lodash/package.json,/node_modules/grunt-contrib-watch/node_modules/lodash/package.json,/node_modules/grunt-legacy-log/node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-0.4.5.tgz (Root Library)
    • grunt-legacy-log-0.1.3.tgz
      • :x: lodash-2.4.2.tgz (Vulnerable Library)
lodash-4.13.1.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.13.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-contrib-nodeunit-1.0.0.tgz (Root Library)
    • nodeunit-0.9.5.tgz
      • tap-7.1.2.tgz
        • nyc-7.1.0.tgz
          • istanbul-lib-instrument-1.1.0-alpha.4.tgz
            • babel-types-6.11.1.tgz
              • :x: lodash-4.13.1.tgz (Vulnerable Library)
lodash-2.4.1.tgz

A utility library delivering consistency, customization, performance, & extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grunt-ts/node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-ts-5.3.2.tgz (Root Library)
    • :x: lodash-2.4.1.tgz (Vulnerable Library)
lodash-1.2.1.tgz

A utility library delivering consistency, customization, performance, and extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-1.2.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grunt-webpack/node_modules/lodash/package.json

Dependency Hierarchy:

  • grunt-webpack-1.0.11.tgz (Root Library)
    • :x: lodash-1.2.1.tgz (Vulnerable Library)
lodash-3.10.1.tgz

The modern build of lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/karma/node_modules/lodash/package.json,/node_modules/csproj2ts/node_modules/lodash/package.json,/node_modules/grunt-karma/node_modules/lodash/package.json,/node_modules/karma-webpack/node_modules/lodash/package.json

Dependency Hierarchy:

  • karma-0.13.22.tgz (Root Library)
    • :x: lodash-3.10.1.tgz (Vulnerable Library)

Found in HEAD commit: 91ceb6046aaa22e9934ed13ea5acba9c988c490c

Found in base branch: master

Vulnerability Details

lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects. Mend Note: Converted from WS-2019-0184, on 2022-11-08.

Publish Date: 2018-06-07

URL: CVE-2018-3721

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1067

Release Date: 2018-06-07

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (grunt-contrib-watch): 1.0.1

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (grunt): 1.0.3

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (grunt): 1.0.3

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (grunt-contrib-nodeunit): 2.0.0

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (grunt-webpack): 1.0.12

Fix Resolution (lodash): 4.17.5

Direct dependency fix Resolution (karma): 2.0.0


Step up your Open Source Security Game with Mend here

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.