CVE-2021-23337

Published on: 02/15/2021 12:00:00 AM UTC

Last Modified on: 09/13/2022 09:25:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C

Certain versions of Lodash from Lodash contain the following vulnerability:

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

  • CVE-2021-23337 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.2 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Command Injection in org.webjars.bowergithub.lodash:lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
Command Injection in lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JS-LODASH-1040724
Command Injection in org.webjars.bower:lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
Command Injection in org.webjars:lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
February 2021 Lodash Vulnerabilities in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20210312-0006/
Oracle Critical Patch Update Advisory - July 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com//security-alerts/cpujul2021.html
cert-portal.siemens.com
application/pdf
URL Logo CONFIRM cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
Oracle Critical Patch Update Advisory - October 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2021.html
lodash/lodash.js at ddfd9b11a0126db2302cb70ec9973b66baec0975 · lodash/lodash · GitHub Broken Link
github.com
text/html
URL Logo MISC github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
Oracle Critical Patch Update Advisory - January 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujan2022.html
Command Injection in org.webjars.npm:lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
Command Injection in org.fujion.webjars:lodash | Snyk Exploit
Third Party Advisory
snyk.io
text/html
URL Logo MISC snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
Oracle Critical Patch Update Advisory - July 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2022.html

Related QID Numbers

  • 180353 Debian Security Update for node-lodash (CVE-2021-23337)
  • 376257 Oracle PeopleSoft Enterprise PeopleTools Product Multiple Vulnerabilities (CPUJAN2022)
  • 377842 Lodash Command Injection Vulnerability
  • 980336 Nodejs (npm) Security Update for lodash (GHSA-35jh-r3h4-6jhm)

Exploit/POC from Github

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. CVE project by @Sn0wA…

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLodashLodashAllAllAllAll
ApplicationLodashLodashAllAllAllAll
ApplicationNetappActive Iq Unified Manager-AllAllAll
ApplicationNetappActive Iq Unified Manager-AllAllAll
ApplicationNetappActive Iq Unified Manager-AllAllAll
ApplicationNetappCloud Manager-AllAllAll
ApplicationNetappSystem Manager9.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.2.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.3.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.5.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.2.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.3.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.5.0AllAllAll
ApplicationOracleBanking Extensibility Workbench14.2.0AllAllAll
ApplicationOracleBanking Extensibility Workbench14.3.0AllAllAll
ApplicationOracleBanking Extensibility Workbench14.5.0AllAllAll
ApplicationOracleBanking Supply Chain Finance14.2.0AllAllAll
ApplicationOracleBanking Supply Chain Finance14.3.0AllAllAll
ApplicationOracleBanking Supply Chain Finance14.5.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.2.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.3.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.5.0AllAllAll
ApplicationOracleCommunications Cloud Native Core Binding Support Function1.9.0AllAllAll
ApplicationOracleCommunications Cloud Native Core Policy1.11.0AllAllAll
ApplicationOracleCommunications Design Studio7.4.2.0.0AllAllAll
ApplicationOracleCommunications Services Gatekeeper7.0AllAllAll
ApplicationOracleCommunications Session Border Controller8.4AllAllAll
ApplicationOracleCommunications Session Border Controller9.0AllAllAll
ApplicationOracleEnterprise Communications Broker3.2.0AllAllAll
ApplicationOracleEnterprise Communications Broker3.3.0AllAllAll
ApplicationOracleFinancial Services Crime And Compliance Management Studio8.0.8.2.0AllAllAll
ApplicationOracleFinancial Services Crime And Compliance Management Studio8.0.8.3.0AllAllAll
ApplicationOracleHealth Sciences Data Management Workbench2.5.2.1AllAllAll
ApplicationOracleHealth Sciences Data Management Workbench3.0.0.0AllAllAll
ApplicationOracleJd Edwards Enterpriseone ToolsAllAllAllAll
ApplicationOraclePeoplesoft Enterprise Peopletools8.58AllAllAll
ApplicationOraclePeoplesoft Enterprise Peopletools8.59AllAllAll
ApplicationOraclePrimavera GatewayAllAllAllAll
ApplicationOraclePrimavera GatewayAllAllAllAll
ApplicationOraclePrimavera GatewayAllAllAllAll
ApplicationOraclePrimavera GatewayAllAllAllAll
ApplicationOraclePrimavera Unifier18.8AllAllAll
ApplicationOraclePrimavera Unifier19.12AllAllAll
ApplicationOraclePrimavera Unifier20.12AllAllAll
ApplicationOraclePrimavera UnifierAllAllAllAll
ApplicationOracleRetail Customer Management And Segmentation Foundation19.0AllAllAll
ApplicationSiemensSinec InsAllAllAllAll
ApplicationSiemensSinec Ins1.0-AllAll
ApplicationSiemensSinec Ins1.0sp1AllAll
  • cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
  • cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*:
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*:
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*:
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*:
  • cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:system_manager:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_extensibility_workbench:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_extensibility_workbench:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:health_sciences_data_management_workbench:2.5.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:health_sciences_data_management_workbench:3.0.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*:

Discovery Credit

Marc Hassan

Social Mentions

Source Title Posted (UTC)
Twitter Icon @simnalamburt @8a9da5f5 이거여 Command Injection이고 Severity는 7.2 HIGH에요 2021-05-11 05:50:59
Twitter Icon @ommepe CVE-2021-23337 2021-06-07 04:35:56
Twitter Icon @ommepe CVE-2021-23337 snyk.io/vuln/SNYK-JAVA… 2021-06-07 04:36:54
Twitter Icon @management_sun 2/3 CVE-2021-29505 CVE-2021-27906 CVE-2021-26272 CVE-2021-23337 CVE-2021-21409 CVE-2021-21345 CVE-2020-28052 CVE-20… twitter.com/i/web/status/1… 2021-10-20 02:03:07
Twitter Icon @management_sun 2/3 CVE-2021-29505 CVE-2021-27906 CVE-2021-26272 CVE-2021-23337 CVE-2021-21409 CVE-2021-21345 CVE-2020-28052 CVE-20… twitter.com/i/web/status/1… 2021-10-20 02:04:03
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report