Inefficient Regular Expression Complexity in lodash
CVE-2020-28500
- lodash
- lodash-es
- lodash-rails
- lodash.trim
- lodash.trimend
- org.fujion.webjars:lodash
- org.webjars:lodash
- org.webjars.npm:lodash-es
- org.webjars.npm:lodash.trim
- org.webjars.npm:lodash.trimend
Summary
Lodash versions 4.x prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the "toNumber()", "trim()" and "trimEnd()" functions.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- LOW
CWE-1333 - Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
References
Advisory Timeline
- Published