[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash:4.17.19
sonatype-depshield opened this issue · 1 comments
Vulnerabilities
DepShield reports that this application's usage of lodash:4.17.19 results in the following vulnerability(s):
- (CVSS 7.4) [CVE-2020-8203] Prototype pollution attack when using _.zipObjectDeep in lodash <= 4.17.15.
- (CVSS 5.3) [CVE-2020-28500] All versions of package lodash; all versions of package org.fujion.webjars:lodas...
Occurrences
lodash:4.17.19 is a transitive dependency introduced by the following direct dependency(s):
• async:2.6.2
└─ lodash:4.17.19
• jest:26.0.1
└─ @jest/core:26.0.1
└─ @jest/transform:26.0.1
└─ @babel/core:7.10.2
└─ @babel/generator:7.10.2
└─ lodash:4.17.19
└─ @babel/helper-module-transforms:7.10.1
└─ lodash:4.17.19
└─ @babel/traverse:7.10.1
└─ lodash:4.17.19
└─ lodash:4.17.19
└─ jest-config:26.0.1
└─ jest-environment-jsdom:26.0.1
└─ jsdom:16.2.2
└─ request-promise-native:1.0.8
└─ request-promise-core:1.1.3
└─ lodash:4.17.19
└─ jest-snapshot:26.0.1
└─ @babel/types:7.10.2
└─ lodash:4.17.19
• jshint:2.12.0
└─ lodash:4.17.19
• log4js:4.3.1
└─ streamroller:1.0.5
└─ lodash:4.17.19
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.
Bumped dependency version.