lodash 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-202007-1043 | CVE编号 | CVE-2020-8203 |
发布时间 | 2020-07-15 | 更新时间 | 2020-12-18 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
lodash是一款开源的JavaScript实用程序库。
lodash 4.17.15及之前版本中存在输入验证错误漏洞。远程攻击者可借助‘merge’、‘mergeWith’和‘defaultsDeep’函数利用该漏洞在系统上执行任意代码。
漏洞补丁
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.npmjs.com/package/lodash
参考网址
来源:MISC
链接:https://hackerone.com/reports/712065
来源:MISC
链接:https://github.com/lodash/lodash/issues/4874
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200724-0006/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4460/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3700/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4180/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-8203
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158797/Red-Hat-Security-Advisory-2020-3369-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159275/Red-Hat-Security-Advisory-2020-3807-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2715/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Node-js-lodash-privilege-escalation-via-Prototype-Pollution-33309
来源:www.ibm.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160589/Red-Hat-Security-Advisory-2020-5611-01.html
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3255/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-oss-security-scan-issues-for-concerto-installer/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-oss-scan-fixes-for-content-pos/
来源:www.ibm.com
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202007-1043

评论