CVE-2020-28500
Published on: 02/15/2021 12:00:00 AM UTC
Last Modified on: 09/13/2022 09:18:00 PM UTC
Certain versions of Lodash from Lodash contain the following vulnerability:
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
- CVE-2020-28500 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | LOW |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Regular Expression Denial of Service (ReDoS) in lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Regular Expression Denial of Service (ReDoS) in org.webjars.npm:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Regular Expression Denial of Service (ReDoS) in org.webjars.bower:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
February 2021 Lodash Vulnerabilities in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
perf: improve performance of `toNumber`, `trim` and `trimEnd` on large input strings by falsyvalues · Pull Request #5065 · lodash/lodash · GitHub | Patch Third Party Advisory github.com text/html |
![]() |
Oracle Critical Patch Update Advisory - July 2021 | www.oracle.com text/html |
![]() |
cert-portal.siemens.com application/pdf |
![]() | |
Oracle Critical Patch Update Advisory - October 2021 | www.oracle.com text/html |
![]() |
Oracle Critical Patch Update Advisory - January 2022 | www.oracle.com text/html |
![]() |
Regular Expression Denial of Service (ReDoS) in org.webjars.bowergithub.lodash:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Regular Expression Denial of Service (ReDoS) in org.fujion.webjars:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Oracle Critical Patch Update Advisory - July 2022 | www.oracle.com text/html |
![]() |
lodash/trimEnd.js at npm · lodash/lodash · GitHub | Broken Link github.com text/html |
![]() |
Regular Expression Denial of Service (ReDoS) in org.webjars:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Related QID Numbers
- 376257 Oracle PeopleSoft Enterprise PeopleTools Product Multiple Vulnerabilities (CPUJAN2022)
Exploit/POC from Github
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, tri…
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
- cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:health_sciences_data_management_workbench:2.5.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:health_sciences_data_management_workbench:3.0.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*:
Discovery Credit
Liyuan Chen
Social Mentions
Source | Title | Posted (UTC) |
---|