bgoonz / searchAwesome

https://search-awesome.vercel.app/
14 stars 8 forks source link

CVE-2021-23368 (Medium) detected in multiple libraries #430

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2021-23368 - Medium Severity Vulnerability

Vulnerable Libraries - postcss-7.0.21.tgz, postcss-7.0.18.tgz, postcss-7.0.32.tgz, postcss-7.0.23.tgz, postcss-7.0.27.tgz, postcss-7.0.14.tgz, postcss-7.0.35.tgz

postcss-7.0.21.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz

Path to dependency file: searchAwesome/clones/awesome-web-animation/package.json

Path to vulnerable library: searchAwesome/clones/awesome-web-animation/node_modules/postcss/package.json

Dependency Hierarchy: - cssnano-4.1.10.tgz (Root Library) - :x: **postcss-7.0.21.tgz** (Vulnerable Library)

postcss-7.0.18.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.18.tgz

Path to dependency file: searchAwesome/clones/Mind-Expanding-Books/app/package.json

Path to vulnerable library: searchAwesome/clones/Mind-Expanding-Books/app/node_modules/postcss/package.json

Dependency Hierarchy: - tailwindcss-1.7.3.tgz (Root Library) - :x: **postcss-7.0.18.tgz** (Vulnerable Library)

postcss-7.0.32.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz

Path to dependency file: searchAwesome/clones/awesome-docker/package.json

Path to vulnerable library: searchAwesome/clones/awesome-docker/node_modules/purgecss/node_modules/postcss/package.json,searchAwesome/clones/Mind-Expanding-Books/app/node_modules/purgecss/node_modules/postcss/package.json,searchAwesome/clones/Mind-Expanding-Books/app/node_modules/@fullhuman/postcss-purgecss/node_modules/postcss/package.json

Dependency Hierarchy: - parcel-bundler-1.12.4.tgz (Root Library) - htmlnano-0.2.6.tgz - purgecss-2.3.0.tgz - :x: **postcss-7.0.32.tgz** (Vulnerable Library)

postcss-7.0.23.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.23.tgz

Path to dependency file: searchAwesome/clones/awesome-web-animation/package.json

Path to vulnerable library: searchAwesome/clones/awesome-web-animation/node_modules/autoprefixer/node_modules/postcss/package.json

Dependency Hierarchy: - autoprefixer-9.7.2.tgz (Root Library) - :x: **postcss-7.0.23.tgz** (Vulnerable Library)

postcss-7.0.27.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz

Path to dependency file: searchAwesome/clones/awesome-wpo/website/package.json

Path to vulnerable library: searchAwesome/clones/awesome-wpo/website/node_modules/postcss/package.json

Dependency Hierarchy: - gatsby-plugin-prefetch-google-fonts-1.4.3.tgz (Root Library) - google-fonts-plugin-2.0.2.tgz - cssnano-4.1.10.tgz - :x: **postcss-7.0.27.tgz** (Vulnerable Library)

postcss-7.0.14.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.14.tgz

Path to dependency file: searchAwesome/clones/awesome-stacks/package.json

Path to vulnerable library: searchAwesome/clones/awesome-stacks/node_modules/postcss/package.json

Dependency Hierarchy: - gatsby-2.1.19.tgz (Root Library) - autoprefixer-9.4.9.tgz - :x: **postcss-7.0.14.tgz** (Vulnerable Library)

postcss-7.0.35.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz

Path to dependency file: searchAwesome/clones/awesome-docker/package.json

Path to vulnerable library: searchAwesome/clones/awesome-docker/node_modules/postcss/package.json

Dependency Hierarchy: - parcel-bundler-1.12.4.tgz (Root Library) - :x: **postcss-7.0.35.tgz** (Vulnerable Library)

Found in HEAD commit: cb1b8421c464b43b24d4816929e575612a00cd49

Found in base branch: master

Vulnerability Details

The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.

Publish Date: 2021-04-12

URL: CVE-2021-23368

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368

Release Date: 2021-04-12

Fix Resolution: postcss -8.2.10


Step up your Open Source Security Game with WhiteSource here