Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update iodash (vulnerability report from GitHub) #40

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Update iodash (vulnerability report from GitHub) #40

wants to merge 1 commit into from

Conversation

conao3
Copy link

@conao3 conao3 commented Feb 25, 2019

Hi.
I receive below vulnerability report from Github.
If there is nothing to worry about, please merge it.

Remediation

Upgrade lodash to version 4.17.5 or later. For example:

"dependencies": {
  "lodash": ">=4.17.5"
}

or…

"devDependencies": {
  "lodash": ">=4.17.5"
}

Always verify the validity and compatibility of suggestions with your codebase.

Details

CVE-2018-3721 More information
moderate severity
Vulnerable versions: < 4.17.5
Patched version: 4.17.5
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.

Update iodash.

Below message is a vulnerability report from Github.

## Remediation
Upgrade lodash to version 4.17.5 or later. For example:
```
"dependencies": {
  "lodash": ">=4.17.5"
}
```
or…
```
"devDependencies": {
  "lodash": ">=4.17.5"
}
```
Always verify the validity and compatibility of suggestions with your codebase.

## Details
CVE-2018-3721 More information
moderate severity
Vulnerable versions: < 4.17.5
Patched version: 4.17.5
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant