Update dependency lodash to v4.17.21 [SECURITY]#431
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
Update dependency lodash to v4.17.21 [SECURITY]#431renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
569d88a to
eb43e50
Compare
eb43e50 to
4fb88c0
Compare
4fb88c0 to
75a63c2
Compare
6a68d29 to
a5f4cc9
Compare
a5f4cc9 to
c0ccb90
Compare
c0ccb90 to
aa48f48
Compare
aa48f48 to
dda63bf
Compare
dda63bf to
15f791b
Compare
15f791b to
40a425d
Compare
40a425d to
c5923d6
Compare
c5923d6 to
8b42294
Compare
8b42294 to
556dc0d
Compare
556dc0d to
46d4b88
Compare
46d4b88 to
de13387
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.17.19→4.17.21GitHub Vulnerability Alerts
CVE-2021-23337
lodashversions prior to 4.17.21 are vulnerable to Command Injection via the template function.CVE-2019-10744
Versions of
lodashbefore 4.17.12 are vulnerable to Prototype Pollution. The functiondefaultsDeepallows a malicious user to modify the prototype ofObjectvia{constructor: {prototype: {...}}}causing the addition or modification of an existing property that will exist on all objects.Recommendation
Update to version 4.17.12 or later.
CVE-2020-8203
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The functions
pick,set,setWith,update,updateWith, andzipObjectDeepallow a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires manipulating objects based on user-provided property values or arrays.This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
Release Notes
lodash/lodash (lodash)
v4.17.21Compare Source
v4.17.20Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.