This repository has been archived by the owner on Dec 9, 2023. It is now read-only.
CVE-2021-23337 (High) detected in multiple libraries #161
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-23337 - High Severity Vulnerability
lodash-1.0.2.tgz
A utility library delivering consistency, customization, performance, and extras.
Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/globule/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-4.17.5.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.5.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/node-sass/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-4.17.4.tgz
Lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/gulp-uglify/node_modules/lodash/package.json
Dependency Hierarchy:
lodash-3.10.1.tgz
The modern build of lodash modular utilities.
Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz
Path to dependency file: /Website/package.json
Path to vulnerable library: Website/node_modules/lodash/package.json
Dependency Hierarchy:
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Publish Date: 2021-02-15
URL: CVE-2021-23337
Base Score Metrics:
Type: Upgrade version
Origin: lodash/lodash@3469357
Release Date: 2021-02-15
Fix Resolution: lodash - 4.17.21
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: