pydash is vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
66
Medium Risk
Affected versions of this package are vulnerable to Unsafe Reflection via invoke() Validation Bypass, where the invoke() function skips the validation logic intended to restrict access to internal attributes such as __globals__ or __builtins__, allowing for unsafe reflection. An attacker could exploit this by crafting malicious inputs to invoke() to access these internals, potentially leading to information disclosure or remote code execution.
You are affected if you are using a version that falls within the vulnerable range.
pydash is vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in versions 6.0.0 - 8.0.5.
Upgrade the pydash library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant