Lucene search

K
cve[email protected]CVE-2019-10744
HistoryJul 26, 2019 - 12:15 a.m.

CVE-2019-10744

2019-07-2600:15:11
CWE-1321
web.nvd.nist.gov
310
3
20
lodash
vulnerability
prototype pollution
cve-2019-10744
nvd

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.9 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.015 Low

EPSS

Percentile

86.8%

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

Affected configurations

NVD
Node
lodashlodashRange<4.17.12node.js
Node
netappactive_iq_unified_managerMatch-linux
OR
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappactive_iq_unified_managerMatch-windows
OR
netappservice_level_managerMatch-
Node
redhatvirtualization_managerMatch4.3
Node
oraclebanking_extensibility_workbenchMatch14.3.0
OR
oraclebanking_extensibility_workbenchMatch14.4.0
Node
f5big-ip_access_policy_managerRange12.1.012.1.5.2
OR
f5big-ip_access_policy_managerRange13.1.013.1.3.4
OR
f5big-ip_access_policy_managerRange14.1.014.1.2.5
OR
f5big-ip_access_policy_managerRange15.0.015.0.1.4
OR
f5big-ip_access_policy_managerRange15.1.015.1.0.2
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.5.2
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.3.4
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.2.5
OR
f5big-ip_advanced_firewall_managerRange15.0.015.0.1.4
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.0.2
OR
f5big-ip_analyticsRange12.1.012.1.5
OR
f5big-ip_analyticsRange13.1.013.1.3
OR
f5big-ip_analyticsRange14.1.014.1.2
OR
f5big-ip_analyticsRange15.0.015.0.1.3
OR
f5big-ip_analyticsRange15.1.015.1.0.2
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.5.2
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.3.4
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.2.5
OR
f5big-ip_application_acceleration_managerRange15.0.015.0.1.4
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.0.2
OR
f5big-ip_application_security_managerRange12.1.012.1.5.2
OR
f5big-ip_application_security_managerRange13.1.013.1.3.4
OR
f5big-ip_application_security_managerRange14.1.014.1.2.5
OR
f5big-ip_application_security_managerRange15.0.015.0.1.4
OR
f5big-ip_application_security_managerRange15.1.015.1.0.2
OR
f5big-ip_application_visibility_and_reportingRange12.1.012.1.5.2
OR
f5big-ip_application_visibility_and_reportingRange13.1.013.1.3
OR
f5big-ip_application_visibility_and_reportingRange14.1.014.1.2.5
OR
f5big-ip_application_visibility_and_reportingRange15.1.015.1.1
OR
f5big-ip_domain_name_systemRange12.1.012.1.5.2
OR
f5big-ip_domain_name_systemRange13.1.013.1.3.4
OR
f5big-ip_domain_name_systemRange14.1.014.1.2.5
OR
f5big-ip_domain_name_systemRange15.0.015.0.1.4
OR
f5big-ip_domain_name_systemRange15.1.015.1.0.2
OR
f5big-ip_edge_gatewayRange12.1.012.1.5.2
OR
f5big-ip_edge_gatewayRange13.1.013.1.3.4
OR
f5big-ip_edge_gatewayRange14.1.014.1.2.5
OR
f5big-ip_edge_gatewayRange15.0.015.0.1.4
OR
f5big-ip_edge_gatewayRange15.1.015.1.0.2
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.5.2
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.3.4
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.2.5
OR
f5big-ip_fraud_protection_serviceRange15.0.015.0.1.4
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.0.2
OR
f5big-ip_global_traffic_managerRange12.1.012.1.5.2
OR
f5big-ip_global_traffic_managerRange13.1.013.1.3.4
OR
f5big-ip_global_traffic_managerRange14.1.014.1.2.5
OR
f5big-ip_global_traffic_managerRange15.0.015.0.1.4
OR
f5big-ip_global_traffic_managerRange15.1.015.1.0.2
OR
f5big-ip_link_controllerRange12.1.012.1.5.2
OR
f5big-ip_link_controllerRange13.1.013.1.3.4
OR
f5big-ip_link_controllerRange14.1.014.1.2.5
OR
f5big-ip_link_controllerRange15.0.015.0.1.4
OR
f5big-ip_link_controllerRange15.1.015.1.0.2
OR
f5big-ip_local_traffic_managerRange12.1.012.1.5.2
OR
f5big-ip_local_traffic_managerRange13.1.013.1.3.4
OR
f5big-ip_local_traffic_managerRange14.1.014.1.2.5
OR
f5big-ip_local_traffic_managerRange15.0.015.0.1.4
OR
f5big-ip_local_traffic_managerRange15.1.015.1.0.2
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.5.2
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.3.4
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.2.5
OR
f5big-ip_policy_enforcement_managerRange15.0.015.0.1.4
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.0.2
OR
f5big-ip_webacceleratorRange12.1.012.1.5.2
OR
f5big-ip_webacceleratorRange13.1.013.1.3.4
OR
f5big-ip_webacceleratorRange14.1.014.1.2.5
OR
f5big-ip_webacceleratorRange15.0.015.0.1.4
OR
f5big-ip_webacceleratorRange15.1.015.1.0.2
OR
f5big-iq_centralized_managementRange6.0.06.1.0
OR
f5big-iq_centralized_managementMatch5.4.0
OR
f5big-iq_centralized_managementMatch7.0.0
OR
f5iworkflowMatch2.3.0
CPENameOperatorVersion
lodash:lodashlodashlt4.17.12

CNA Affected

[
  {
    "product": "lodash",
    "vendor": "Snyk",
    "versions": [
      {
        "status": "affected",
        "version": "All versions prior to 4.17.12"
      }
    ]
  }
]

Social References

More

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.9 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.015 Low

EPSS

Percentile

86.8%