Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-21222

Опубликовано: 30 сент. 2022
Источник: debian

Описание

The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-css-whatfixed5.0.1-1package
node-css-whatfixed4.0.0-3+deb11u1bullseyepackage

Примечания

  • https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488

  • ReDoS issue fixed with rewrite of module to TypeScript

  • Not fixed in 4.0.0 see https://sources.debian.org/src/node-css-what/4.0.0-3/src/parse.ts/#L84

  • Fixed by https://github.com/fb55/css-what/pull/503/commits/46b0dbd6f38fb375da02208426f93f87f7169b7e

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 3 лет назад

The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.

CVSS3: 7.5
redhat
больше 3 лет назад

The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.

CVSS3: 5.3
nvd
больше 3 лет назад

The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.

CVSS3: 7.5
github
больше 3 лет назад

css-what vulnerable to ReDoS due to use of insecure regular expression