Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency lodash to 4.17.21 [security] #9493

Merged
merged 1 commit into from May 4, 2022

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 23, 2022

WhiteSource Renovate

This PR contains the following updates:

Package Change
lodash 4.17.20 -> 4.17.21
lodash 4.17.15 -> 4.17.21

GitHub Vulnerability Alerts

CVE-2020-28500

All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)

CVE-2021-23337

lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

CVE-2020-8203

Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.

This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.


Configuration

📅 Schedule: "" (UTC).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label Apr 23, 2022
@coveralls
Copy link

coveralls commented Apr 23, 2022

Pull Request Test Coverage Report for Build 76f90567-1173-4c46-916e-3dd821d9efc4

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 94.044%

Totals Coverage Status
Change from base Build 0a7dce2a-d55f-4ed3-96fe-535d2466a616: 0.0%
Covered Lines: 5763
Relevant Lines: 6128

💛 - Coveralls

@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch 28 times, most recently from 2ab6181 to a60aa4f Compare April 27, 2022 20:09
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch 26 times, most recently from 6203da5 to 7e78d2f Compare May 3, 2022 23:26
@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 7e78d2f to 2574a79 Compare May 4, 2022 02:55
@kamilmysliwiec kamilmysliwiec merged commit a5eb9b3 into master May 4, 2022
@delete-merged-branch delete-merged-branch bot deleted the renovate/npm-lodash-vulnerability branch May 4, 2022 11:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants