GHSA-x5rq-j2xg-h7qm

Suggest an improvement
Source
https://github.com/advisories/GHSA-x5rq-j2xg-h7qm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-x5rq-j2xg-h7qm/GHSA-x5rq-j2xg-h7qm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x5rq-j2xg-h7qm
Aliases
Published
2019-07-19T16:13:07Z
Modified
2025-01-14T06:29:25.848315Z
Summary
Regular Expression Denial of Service (ReDoS) in lodash
Details

lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2019-07-19T16:11:26Z"
}
References

Affected packages

npm / lodash

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.11

npm / lodash-es

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.11

npm / lodash-amd

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.11