CVE-2021-23337
Published on: 02/15/2021 12:00:00 AM UTC
Last Modified on: 09/13/2022 09:25:00 PM UTC
Certain versions of Lodash from Lodash contain the following vulnerability:
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
- CVE-2021-23337 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.2 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Command Injection in org.webjars.bowergithub.lodash:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Command Injection in lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Command Injection in org.webjars.bower:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Command Injection in org.webjars:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
February 2021 Lodash Vulnerabilities in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
Oracle Critical Patch Update Advisory - July 2021 | www.oracle.com text/html |
![]() |
cert-portal.siemens.com application/pdf |
![]() | |
Oracle Critical Patch Update Advisory - October 2021 | www.oracle.com text/html |
![]() |
lodash/lodash.js at ddfd9b11a0126db2302cb70ec9973b66baec0975 · lodash/lodash · GitHub | Broken Link github.com text/html |
![]() |
Oracle Critical Patch Update Advisory - January 2022 | www.oracle.com text/html |
![]() |
Command Injection in org.webjars.npm:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Command Injection in org.fujion.webjars:lodash | Snyk | Exploit Third Party Advisory snyk.io text/html |
![]() |
Oracle Critical Patch Update Advisory - July 2022 | www.oracle.com text/html |
![]() |
Related QID Numbers
Exploit/POC from Github
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. CVE project by @Sn0wA…
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
- cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*:
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*:
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*:
- cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:system_manager:9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_extensibility_workbench:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:health_sciences_data_management_workbench:2.5.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:health_sciences_data_management_workbench:3.0.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*:
Discovery Credit
Marc Hassan
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
@8a9da5f5 이거여 Command Injection이고 Severity는 7.2 HIGH에요 | 2021-05-11 05:50:59 |
![]() |
CVE-2021-23337 | 2021-06-07 04:35:56 |
![]() |
CVE-2021-23337 snyk.io/vuln/SNYK-JAVA… | 2021-06-07 04:36:54 |
![]() |
2/3 CVE-2021-29505 CVE-2021-27906 CVE-2021-26272 CVE-2021-23337 CVE-2021-21409 CVE-2021-21345 CVE-2020-28052 CVE-20… twitter.com/i/web/status/1… | 2021-10-20 02:03:07 |
![]() |
2/3 CVE-2021-29505 CVE-2021-27906 CVE-2021-26272 CVE-2021-23337 CVE-2021-21409 CVE-2021-21345 CVE-2020-28052 CVE-20… twitter.com/i/web/status/1… | 2021-10-20 02:04:03 |