CVE Vulnerabilities

CVE-2019-10744

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Published: Jul 26, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
9.1 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

Weakness

The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

Affected Software

NameVendorStart VersionEnd Version
LodashLodash*4.17.12 (excluding)
Jaeger-1.17RedHatdistributed-tracing/jaeger-all-in-one-rhel7:1.17.2-3*
Jaeger-1.17RedHatdistributed-tracing/jaeger-query-rhel7:1.17.2-3*
Openshift Service Mesh 1.0RedHatjaeger-0:v1.13.1.redhat7-1.el7*
Openshift Service Mesh 1.0RedHatkiali-0:v1.0.11.redhat1-1.el7*
OpenShift Service Mesh 1.0RedHatservicemesh-grafana-0:6.2.2-36.el8*
Red Hat AMQ 7.10.0RedHatnodejs-lodash*
Red Hat Fuse 7.10RedHatnodejs-lodash*
Red Hat Virtualization Engine 4.3RedHatovirt-web-ui-0:1.6.0-1.el7ev*
Node-lodashUbuntudisco*
Node-lodashUbuntueoan*
Node-lodashUbuntutrusty*

Potential Mitigations

References