Red Hat Bugzilla – Bug 1545884
CVE-2018-3721 lodash: Prototype pollution in utilities function
Last modified: 2018-06-29 18:32:25 EDT
Affected versions of this package are vulnerable to Prototype Pollution. The utilities function allows modification of the Object prototype. If an attacker can control part of the structure passed to this function, they could add or modify an existing property leading to potential denial of service. Upstream patch: https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a References: https://snyk.io/vuln/npm:lodash:20180130 https://hackerone.com/reports/310443
Created lodash tracking bugs for this issue: Affects: fedora-all [bug 1545887] Created nodejs-lodash tracking bugs for this issue: Affects: epel-all [bug 1545885]
Node of the libraries, or services using the lodash in RHMAP call the vulnerable methods with the expection of the _send function in 'sendgrid' version 1.9.1. For 'sendgrid' the parameters passed to 'lodash.merge' are not obtained from user input: https://github.com/sendgrid/sendgrid-nodejs/blob/967fb3105908617b41b761d3f18bbc623eb4579a/lib/sendgrid.js#L70