advanced-web-developer-bootcamp-notes-examples-and-exercises icon indicating copy to clipboard operation
advanced-web-developer-bootcamp-notes-examples-and-exercises copied to clipboard

CVE-2020-28500 (Medium) detected in lodash-4.17.10.tgz

Open mend-bolt-for-github[bot] opened this issue 4 years ago • 0 comments

CVE-2020-28500 - Medium Severity Vulnerability

Vulnerable Library - lodash-4.17.10.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.10.tgz

Path to dependency file: /Section30-Building-A-FullStack-App-With-React/fullstack-todo-app/todos_api/package.json

Path to vulnerable library: /Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json,/Section28-The-Virtual-DOM-Events-and-Forms/memory-game-exercise/node_modules/lodash/package.json

Dependency Hierarchy:

  • mongoose-5.2.4.tgz (Root Library)
    • async-2.6.1.tgz
      • :x: lodash-4.17.10.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Mend Note: After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.

Publish Date: 2021-02-15

URL: CVE-2020-28500

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500

Release Date: 2021-02-15

Fix Resolution (lodash): 4.17.21

Direct dependency fix Resolution (mongoose): 5.2.5


Step up your Open Source Security Game with Mend here