CVE-2019-10744
📋 TL;DR
CVE-2019-10744 is a prototype pollution vulnerability in lodash versions below 4.17.12. Attackers can manipulate the defaultsDeep function to modify Object.prototype, potentially leading to denial of service, remote code execution, or privilege escalation. This affects any application using vulnerable lodash versions, particularly Node.js applications and web applications with lodash dependencies.
💻 Affected Systems
- lodash
- Node.js applications using lodash
- Web applications with lodash dependencies
📦 What is this software?
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Lodash by Lodash
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data exfiltration, or persistent backdoor installation.
Likely Case
Denial of service, application crashes, or privilege escalation within the application context.
If Mitigated
Limited impact with proper input validation, sandboxing, and security controls in place.
🎯 Exploit Status
Public proof-of-concept code exists and exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.17.12 and later
Vendor Advisory: https://snyk.io/vuln/SNYK-JS-LODASH-450202
Restart Required: Yes
Instructions:
1. Update lodash to version 4.17.12 or higher using npm update lodash. 2. Restart all affected applications. 3. Verify no dependencies are pulling in older versions.
🔧 Temporary Workarounds
Input validation and sanitization
allImplement strict input validation to reject malicious payloads before they reach defaultsDeep function.
Object.freeze on Object.prototype
allPrevent prototype pollution by freezing Object.prototype (may break legitimate functionality).
Object.freeze(Object.prototype)
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block prototype pollution payloads.
- Isolate affected applications in containers or VMs with strict network segmentation.
🔍 How to Verify
Check if Vulnerable:
Check package.json or run npm list lodash to see installed version.
Check Version:
npm list lodash | grep lodash
Verify Fix Applied:
Confirm lodash version is 4.17.12 or higher and test application functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual application crashes
- Unexpected property modifications in logs
- Suspicious input patterns
Network Indicators:
- HTTP requests with crafted JSON payloads targeting lodash endpoints
SIEM Query:
source="application.log" AND "defaultsDeep" AND ("crash" OR "error")
🔗 References
- https://access.redhat.com/errata/RHSA-2019:3024
- https://security.netapp.com/advisory/ntap-20191004-0005/
- https://snyk.io/vuln/SNYK-JS-LODASH-450202
- https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://access.redhat.com/errata/RHSA-2019:3024
- https://security.netapp.com/advisory/ntap-20191004-0005/
- https://snyk.io/vuln/SNYK-JS-LODASH-450202
- https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html