Skip to content

Fix lodash security vulnerabilities (Dependabot alerts #36, #61, #62) #23

@FernandoCelmer

Description

@FernandoCelmer

Description

Three open Dependabot alerts related to lodash in package-lock.json:

Alert Severity Summary
#62 High Code Injection via _.template imports key names
#61 Medium Prototype Pollution via _.unset and _.omit (array path bypass)
#36 Medium Prototype Pollution in _.unset and _.omit

Current State

  • lodash@4.17.21 is a transitive dependency (from Serverless Framework and other dev deps)
  • All three alerts are resolved by upgrading to lodash@4.18.0

Solution

Add an overrides entry in package.json to force lodash@>=4.18.0 for all transitive dependencies and regenerate package-lock.json.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions