[Security] Bump lodash from 4.17.20 to 4.17.21
Bumps lodash from 4.17.20 to 4.17.21. This update includes security fixes.
Vulnerabilities fixed
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.Patched versions: 4.17.21 Affected versions: < 4.17.21
Regular Expression Denial of Service (ReDoS) in lodash All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
Patched versions: 4.17.21 Affected versions: < 4.17.21
Commits
-
f299b52
Bump to v4.17.21 -
c4847eb
Improve performance oftoNumber
,trim
andtrimEnd
on large input strings -
3469357
Prevent command injection through_.template
'svariable
option - See full diff in compare view
Dependabot commands
You can trigger Dependabot actions by commenting on this MR
-
$dependabot rebase
will rebase this MR -
$dependabot recreate
will recreate this MR rewriting all the manual changes and resolving conflicts