This repository has been archived by the owner on Dec 9, 2023. It is now read-only.
CVE-2020-8203 (High) detected in multiple libraries #171
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-8203 - High Severity Vulnerability
Vulnerable Libraries - lodash-1.0.2.tgz, lodash-4.17.5.tgz, lodash-4.17.4.tgz, lodash-3.10.1.tgz
lodash-1.0.2.tgz
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-4.17.5.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/node-sass/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-4.17.4.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/gulp-uglify/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-3.10.1.tgz
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/lodash/package.json
Dependency Hierarchy:
Vulnerability Details
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
Publish Date: 2020-07-15
URL: CVE-2020-8203
CVSS 3 Score Details (7.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1523
Release Date: 2020-07-23
Fix Resolution: lodash - 4.17.19
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: