CVE-2021-23337

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23337
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23337.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-23337
Aliases
  • GHSA-35jh-r3h4-6jhm
  • SNYK-JAVA-ORGFUJIONWEBJARS-1074932
  • SNYK-JAVA-ORGWEBJARS-1074930
  • SNYK-JAVA-ORGWEBJARSBOWER-1074928
  • SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
  • SNYK-JAVA-ORGWEBJARSNPM-1074929
  • SNYK-JS-LODASH-1040724
Published
2021-02-15T13:15:12Z
Modified
2024-09-18T03:13:19.849456Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

References

Affected packages

Debian:11 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/lodash/lodash

Affected ranges

Type
GIT
Repo
https://github.com/lodash/lodash
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*

3.0.0-npm
3.0.1-npm
3.1.0-npm
3.10.0-npm
3.10.1-npm
3.2.0-npm
3.3.0-npm
3.3.1-npm
3.4.0-npm
3.5.0-npm
3.6.0-npm
3.7.0-npm
3.8.0-npm
3.9.0-npm
3.9.1-npm
3.9.2-npm
3.9.3-npm

4.*

4.0.0-npm
4.0.1-npm
4.1.0-npm
4.10.0-npm
4.11.0-npm
4.11.1-npm
4.11.2-npm
4.12.0-npm
4.13.0-npm
4.13.1-npm
4.14.0-npm
4.14.1-npm
4.14.2-npm
4.15.0-npm
4.16.0-npm
4.16.1-npm
4.16.2-npm
4.16.3-npm
4.16.4-npm
4.16.5-npm
4.16.6-npm
4.17.0-npm
4.17.1-npm
4.17.10-npm
4.17.11-npm
4.17.12-npm
4.17.13-npm
4.17.14-npm
4.17.15-npm
4.17.2-npm
4.17.20-npm
4.17.3-npm
4.17.4-npm
4.17.5-npm
4.17.9-npm
4.2.0-npm
4.2.1-npm
4.3.0-npm
4.4.0-npm
4.5.0-npm
4.5.1-npm
4.6.0-npm
4.6.1-npm
4.7.0-npm
4.8.0-npm
4.8.1-npm
4.8.2-npm
4.9.0-npm