-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2021-23382 - Medium Severity Vulnerability
Vulnerable Libraries - postcss-5.2.18.tgz, postcss-7.0.35.tgz
postcss-5.2.18.tgz
Tool for transforming styles with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-5.2.18.tgz
Path to dependency file: mws-restaurant-stage-1/package.json
Path to vulnerable library: mws-restaurant-stage-1/node_modules/postcss-reduce-transforms/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-colormin/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-merge-idents/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-calc/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-zindex/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-unique-selectors/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-discard-overridden/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-filter-plugins/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/cssnano/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-discard-duplicates/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-minify-params/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-minify-font-values/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-merge-rules/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-ordered-values/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-reduce-initial/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-minify-selectors/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-convert-values/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-discard-empty/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-discard-comments/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-normalize-charset/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-discard-unused/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-normalize-url/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-merge-longhand/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-svgo/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-reduce-idents/node_modules/postcss/package.json,mws-restaurant-stage-1/node_modules/postcss-minify-gradients/node_modules/postcss/package.json
Dependency Hierarchy:
- gulp-cssnano-2.1.3.tgz (Root Library)
- cssnano-3.10.0.tgz
- postcss-convert-values-2.6.1.tgz
- ❌ postcss-5.2.18.tgz (Vulnerable Library)
- postcss-convert-values-2.6.1.tgz
- cssnano-3.10.0.tgz
postcss-7.0.35.tgz
Tool for transforming styles with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz
Path to dependency file: mws-restaurant-stage-1/package.json
Path to vulnerable library: mws-restaurant-stage-1/node_modules/postcss/package.json
Dependency Hierarchy:
- gulp-autoprefixer-7.0.1.tgz (Root Library)
- ❌ postcss-7.0.35.tgz (Vulnerable Library)
Found in HEAD commit: e2dde5f3afe23a1b7f6c9aa592927b2b79aea76f
Found in base branch: master
Vulnerability Details
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern /*\s* sourceMappingURL=(.*).
Publish Date: 2021-04-26
URL: CVE-2021-23382
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382
Release Date: 2021-04-26
Fix Resolution: postcss - 8.2.13
Step up your Open Source Security Game with WhiteSource here