Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2019-10744

Disclosure Date: July 26, 2019
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
9.1 Critical
Impact Score:
5.2
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • f5,
  • lodash,
  • netapp,
  • oracle,
  • redhat

Products

  • active iq unified manager -,
  • banking extensibility workbench 14.3.0,
  • banking extensibility workbench 14.4.0,
  • big-ip access policy manager,
  • big-ip advanced firewall manager,
  • big-ip analytics,
  • big-ip application acceleration manager,
  • big-ip application security manager,
  • big-ip application visibility and reporting,
  • big-ip domain name system,
  • big-ip edge gateway,
  • big-ip fraud protection service,
  • big-ip global traffic manager,
  • big-ip link controller,
  • big-ip local traffic manager,
  • big-ip policy enforcement manager,
  • big-ip webaccelerator,
  • big-iq centralized management,
  • big-iq centralized management 5.4.0,
  • big-iq centralized management 7.0.0,
  • iworkflow 2.3.0,
  • lodash,
  • service level manager -,
  • virtualization manager 4.3
Technical Analysis