ignatandrei / BlocklyAutomation

VisualAPI - LowCode Macros for YOUR API / HTTP Calls : https://visualapi.azurewebsites.net/
https://ignatandrei.github.io/BlocklyAutomation/
MIT License
36 stars 7 forks source link

CVE-2023-48631 (High) detected in css-tools-4.2.0.tgz #225

Closed mend-bolt-for-github[bot] closed 6 months ago

mend-bolt-for-github[bot] commented 9 months ago

CVE-2023-48631 - High Severity Vulnerability

Vulnerable Library - css-tools-4.2.0.tgz

Library home page: https://registry.npmjs.org/@adobe/css-tools/-/css-tools-4.2.0.tgz

Path to dependency file: /src/react_new_app/my-app/package.json

Path to vulnerable library: /src/react_new_app/my-app/node_modules/@adobe/css-tools/package.json

Dependency Hierarchy: - jest-dom-5.16.5.tgz (Root Library) - :x: **css-tools-4.2.0.tgz** (Vulnerable Library)

Found in HEAD commit: d31583affba4f03e6f2be6f5ec3b14e37d47dc25

Found in base branch: main

Vulnerability Details

@adobe/css-tools versions 4.3.1 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS.

Publish Date: 2023-12-14

URL: CVE-2023-48631

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: @adobe/css-tools

Release Date: 2023-12-14

Fix Resolution: @adobe/css-tools - 4.3.2


Step up your Open Source Security Game with Mend here