Bug 1928937 (CVE-2021-23337)
Summary: | CVE-2021-23337 nodejs-lodash: command injection via template | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alazarot, alegrand, anpicker, anstephe, aos-bugs, aturgema, bdettelb, bmontgom, chousekn, cmeyers, davidn, dfediuck, dwhatley, dymurray, eedri, emingora, eparis, erooth, etirelli, extras-orphan, gblomqui, gghezzo, gparvin, ibek, ibolton, jburrell, jcantril, jcosta, jhadvig, jhardy, jmatthew, jmontleo, jokerman, jramanat, jrokos, jshaughn, jstastny, jweiser, jwendell, kakkoyun, kaycoth, kconner, krathod, kverlaen, lcosic, mabashia, mcooper, mgoldboi, michal.skrivanek, mnovotny, nodejs-sig, notting, nstielau, osapryki, pjindal, pkrupa, rcernich, rguimara, rpetrell, rrajasek, sbonazzo, sd-operator-metering, sgratch, sherold, slucidi, smcdonal, sponnaga, sseago, stcannon, surbania, swshanka, tflannag, thee, tomckay, twalsh, tzimanyi, vmugicag |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs-lodash-4.17.21 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in nodejs-lodash. A command injection flaw is possible through template variables.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-04-13 06:39:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1946164, 1928938, 1928939, 1930138, 1930139, 1930140, 1930141, 1930142, 1930143, 1930144, 1930145, 1930146, 1930147, 1931267, 1931268, 1931269, 1931270, 1931271, 1931272, 1931273, 1931274, 1931275, 1937751, 1937752, 1937753, 1938272, 1938273, 2110861 | ||
Bug Blocks: | 1928940 |
Description
Guilherme de Almeida Suckevicz
2021-02-15 20:21:31 UTC
Created lodash tracking bugs for this issue: Affects: fedora-32 [bug 1928939] Created nodejs-lodash tracking bugs for this issue: Affects: epel-all [bug 1928938] While Red Hat Quay has a dependency on lodash via restangular it doesn't use the vulnerable template function. Upstream fix: https://github.com/lodash/lodash/pull/5085/commits/23125079fc43ece274c0e3a49a644ae2dae8b1d3 [not merged yet] Statement: In OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is Low. While Red Hat Virtualization's cockpit-ovirt has a dependency on lodash it doesn't use the vulnerable template function. While Red Hat Quay has a dependency on lodash via restangular it doesn't use the vulnerable template function. This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8 Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7 Via RHSA-2021:1168 https://access.redhat.com/errata/RHSA-2021:1168 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23337 This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2021:2179 https://access.redhat.com/errata/RHSA-2021:2179 This issue has been addressed in the following products: Red Hat OpenShift Jaeger 1.20 Via RHSA-2021:2543 https://access.redhat.com/errata/RHSA-2021:2543 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2021:2438 https://access.redhat.com/errata/RHSA-2021:2438 updated the public date - originally it was incorrectly set to 2019. Thanks @btarasso This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7 Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 Via RHSA-2021:3016 https://access.redhat.com/errata/RHSA-2021:3016 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2021:3459 https://access.redhat.com/errata/RHSA-2021:3459 This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.7 Via RHSA-2022:6429 https://access.redhat.com/errata/RHSA-2022:6429 |