Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10744

Опубликовано: 09 авг. 2019
Источник: redhat
CVSS3: 9.1
EPSS Низкий

Описание

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

A Prototype Pollution vulnerability was found in lodash. Calling certain methods with untrusted JSON could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.

Отчет

The lodash dependency is included in OpenShift Container Platform (OCP) by Kibana in the aggregated logging stack. Elastic have issued a security advisory (ESA-2019-10) for Kibana for this vulnerability, and in that advisory stated that no exploit vectors had been identified in Kibana. Therefore we rate this issue as moderate for OCP and may fix this issue in a future release. https://www.elastic.co/community/security This issue did not affect the versions of rh-nodejs8-nodejs and rh-nodejs10-nodejs as shipped with Red Hat Software Collections. Whilst a vulnerable version of lodash has been included in ServiceMesh, the impact is lowered to Moderate due to the library not being directly accessible increasing the attack complexity and the fact that the attacker would need some existing access - meaning the vulnerability is not crossing a privilege boundary. Red Hat Quay imports lodash as a runtime dependency of restangular. The restangular function in use by Red Hat Quay do not use lodash to parse user input. This issue therefore rated moderate impact for Red Hat Quay.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Red Hat OpenShift Container Platform 3.10nodejs-lodashFix deferred
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-kibana5Will not fix
Red Hat OpenShift Container Platform 3.9nodejs-lodashFix deferred
Red Hat OpenShift Container Platform 4logging-kibana5-containerWill not fix
Red Hat Quay 3quay/quay-rhel8Will not fix
Red Hat Software Collectionsrh-nodejs10-nodejsNot affected
Red Hat Software Collectionsrh-nodejs8-nodejsNot affected
Jaeger-1.17distributed-tracing/jaeger-all-in-one-rhel7FixedRHSA-2020:281906.07.2020
Jaeger-1.17distributed-tracing/jaeger-query-rhel7FixedRHSA-2020:281906.07.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1739497nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties

EPSS

Процентиль: 79%
0.01196
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 6 лет назад

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

CVSS3: 9.1
nvd
больше 6 лет назад

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

CVSS3: 9.1
debian
больше 6 лет назад

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Poll ...

CVSS3: 9.1
github
больше 6 лет назад

Prototype Pollution in lodash

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции defaultsDeep библиотеки Lodash, позволяющая нарушителю вызвать отказ в обслуживании, выполнить произвольный JavaScript-код или повысить свои привилегии

EPSS

Процентиль: 79%
0.01196
Низкий

9.1 Critical

CVSS3