Skip to main content

Inefficient Regular Expression Complexity in lodash

CVE-2020-28500

  • lodash
  • lodash-es
  • lodash-rails
  • lodash.trim
  • lodash.trimend
  • org.fujion.webjars:lodash
  • org.webjars:lodash
  • org.webjars.npm:lodash-es
  • org.webjars.npm:lodash.trim
  • org.webjars.npm:lodash.trimend
Severity Medium
Score 5.3/10

Summary

Lodash versions 4.x prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the "toNumber()", "trim()" and "trimEnd()" functions.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • LOW

CWE-1333 - Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Advisory Timeline

  • Published