{"id":"CVE-2023-26145","details":"This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.\r\r**Note:**\r\rThe pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:\r\r1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)\r\r2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)\r\r\rThe pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.","aliases":["GHSA-8mjr-6c96-39w8","PYSEC-2023-179"],"modified":"2026-04-12T08:31:50.095080Z","published":"2023-09-28T05:15:45.843Z","references":[{"type":"ADVISORY","url":"https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518"},{"type":"FIX","url":"https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021"},{"type":"EVIDENCE","url":"https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dgilland/pydash","events":[{"introduced":"0"},{"fixed":"81d58d6d028e57a252507a7a99179b1150756f7e"},{"fixed":"6ff0831ad285fff937cafd2a853f20cc9ae92021"}],"database_specific":{"cpe":"cpe:2.3:a:derrickgilland:pydash:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"],"extracted_events":[{"introduced":"0"},{"fixed":"6.0.0"}]}}],"versions":["v0.0.0","v1.0.0","v1.1.0","v2.0.0","v2.1.0","v2.2.0","v2.3.0","v2.3.1","v2.3.2","v2.4.0","v3.0.0","v3.0.1","v3.1.0","v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.1.0","v4.2.0","v4.2.1","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.4.0","v4.4.1","v4.5.0","v4.6.0","v4.6.1","v4.7.0","v4.7.1","v4.7.3","v4.7.4","v4.7.5","v4.7.6","v4.8.0","v4.9.0","v4.9.1","v4.9.2","v4.9.3","v5.0.0","v5.0.1","v5.0.2","v5.1.0","v5.1.1","v5.1.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26145.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}