CVE-2020-28500

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28500
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28500.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-28500
Aliases
  • GHSA-29mw-wpgm-hmr9
  • SNYK-JAVA-ORGFUJIONWEBJARS-1074896
  • SNYK-JAVA-ORGWEBJARS-1074894
  • SNYK-JAVA-ORGWEBJARSBOWER-1074892
  • SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895
  • SNYK-JAVA-ORGWEBJARSNPM-1074893
  • SNYK-JS-LODASH-1018905
Related
Published
2021-02-15T11:15:12Z
Modified
2024-09-18T03:10:13.673307Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

References

Affected packages

Debian:11 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/lodash/lodash

Affected ranges

Type
GIT
Repo
https://github.com/lodash/lodash
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*

3.0.0-npm
3.0.1-npm
3.1.0-npm
3.10.0-npm
3.10.1-npm
3.2.0-npm
3.3.0-npm
3.3.1-npm
3.4.0-npm
3.5.0-npm
3.6.0-npm
3.7.0-npm
3.8.0-npm
3.9.0-npm
3.9.1-npm
3.9.2-npm
3.9.3-npm

4.*

4.0.0-npm
4.0.1-npm
4.1.0-npm
4.10.0-npm
4.11.0-npm
4.11.1-npm
4.11.2-npm
4.12.0-npm
4.13.0-npm
4.13.1-npm
4.14.0-npm
4.14.1-npm
4.14.2-npm
4.15.0-npm
4.16.0-npm
4.16.1-npm
4.16.2-npm
4.16.3-npm
4.16.4-npm
4.16.5-npm
4.16.6-npm
4.17.0-npm
4.17.1-npm
4.17.10-npm
4.17.11-npm
4.17.12-npm
4.17.13-npm
4.17.14-npm
4.17.15-npm
4.17.2-npm
4.17.20-npm
4.17.3-npm
4.17.4-npm
4.17.5-npm
4.17.9-npm
4.2.0-npm
4.2.1-npm
4.3.0-npm
4.4.0-npm
4.5.0-npm
4.5.1-npm
4.6.0-npm
4.6.1-npm
4.7.0-npm
4.8.0-npm
4.8.1-npm
4.8.2-npm
4.9.0-npm