Description
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
Remediation
References
https://github.com/lodash/lodash/issues/3359
https://github.com/lodash/lodash/wiki/Changelog
https://security.netapp.com/advisory/ntap-20190919-0004/
https://snyk.io/vuln/SNYK-JS-LODASH-73639
Related Vulnerabilities
CVE-2020-8203 Vulnerability in maven package org.fujion.webjars:lodash
CVE-2021-44908 Vulnerability in npm package sails
CVE-2019-3868 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2019-0200 Vulnerability in maven package org.apache.qpid:qpid-broker-plugins-amqp-0-8-protocol
CVE-2022-28355 Vulnerability in maven package org.scala-js:scalajs-library_2.11