Skip to content

[🐸 Frogbot] Update version of lodash to 4.17.21#3

Open
github-actions[bot] wants to merge 1 commit intomainfrom
frogbot-lodash-96b81bf2b6f458aca41f94fec9a8e75f
Open

[🐸 Frogbot] Update version of lodash to 4.17.21#3
github-actions[bot] wants to merge 1 commit intomainfrom
frogbot-lodash-96b81bf2b6f458aca41f94fec9a8e75f

Conversation

@github-actions
Copy link
Copy Markdown

@github-actions github-actions bot commented Nov 1, 2024

🚨 This automated pull request was created by Frogbot and fixes the below:

📦 Vulnerable Dependencies

✍️ Summary

SEVERITY CONTEXTUAL ANALYSIS DIRECT DEPENDENCIES IMPACTED DEPENDENCY FIXED VERSIONS CVES

Critical
Applicable lodash:4.17.0 lodash 4.17.0 [4.17.12] CVE-2019-10744

🔬 Research Details

Description:
lodash is a modern JavaScript utility library delivering modularity, performance, & extras.

The function defaultsDeep was found to be vulnerable to prototype pollution, when accepting arbitrary source objects from untrusted input

Example of code vulnerable to this issue -

const lodash = require('lodash'); 
const evilsrc = {constructor: {prototype: {evilkey: "evilvalue"}}};
lodash.defaultsDeep({}, evilsrc)

Remediation:

Development mitigations

Add the Object.freeze(Object.prototype); directive once at the beginning of your main JS source code file (ex. index.js), preferably after all your require directives. This will prevent any changes to the prototype object, thus completely negating prototype pollution attacks.


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant