Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Node.js package-lock.json : library: lodash v4.17.15, HIGH severity vulnerability id: NSWG-ECO-516 , title : Allocation of Resources Without Limits or Throttling #527

Closed
cristianbriscaru opened this issue Jun 11, 2020 · 7 comments
Labels
triage/support Indicates an issue that is a support question.

Comments

@cristianbriscaru
Copy link

Hi guys trivy is detecting this vulnerability in Docker image in package-lock.json for a Node server:
lodash v4.17.15 HIGH NSWG-ECO-516 Allocation of Resources Without Limits or Throttling.
I could not find any info regarding this particular vulnerability and npm audit and snyk is not detecting it , also not even the guys maintaining the lodash library seem to be aware of this vulnerability and I could not find any info about it. Can you point me in the wright direction as to where I can find more info or where the vulnerability has been reported ?

@cristianbriscaru cristianbriscaru added the triage/support Indicates an issue that is a support question. label Jun 11, 2020
@Johannestegner
Copy link
Contributor

nodejs/security-wg@166fc1d

That's the commit where it was added to the NSWG database. Odd that the maintainers have not been notified if it is a severe vulnerability imho, but yeah, that's all the data I can find on it!

@Johannestegner
Copy link
Contributor

On further investigation, I figured out that the vulnerability is actually available in snyk too:
https://app.snyk.io/vuln/SNYK-JS-LODASH-567746

It shares the same hackerone link, which seems to have not been fixed in lodash even though a PR have been available since may 7: lodash/lodash#4759

@cristianbriscaru
Copy link
Author

@Johannestegner thank you for the prompt response, I have more than enough info and I will close this issue.

@rickymcgeehan
Copy link

@Johannestegner From what I can tell, this issue has been resolved in Lodash v4.17.19, however Trivy is still reporting a HIGH severity vulnerability.

Lodash PR: lodash/lodash#4759
Npm advisory: https://www.npmjs.com/advisories/1523

Please could you let me know if this is the case and if so when the Trivy db will be updated?

@Johannestegner
Copy link
Contributor

Hi there @rickymcgeehan! I'm not in the trivy team, so can't help you there, sorry!

@rickymcgeehan
Copy link

Hi there @rickymcgeehan! I'm not in the trivy team, so can't help you there, sorry!

Sorry! I wrongly assumed!

@knqyf263
Copy link
Collaborator

knqyf263 commented Aug 5, 2020

@Johannestegner Thank you for answering on my behalf!

josedonizetti pushed a commit to josedonizetti/trivy that referenced this issue Jun 24, 2022
Co-authored-by: Owen Rumney <owen.rumney@aquasec.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
triage/support Indicates an issue that is a support question.
Projects
None yet
Development

No branches or pull requests

4 participants