-
Notifications
You must be signed in to change notification settings - Fork 1
Description
📂 Vulnerable Library - postcss-loader-3.0.0.tgz
PostCSS loader for webpack
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss-loader/package.json
Findings
| Finding | Severity | 🎯 CVSS | Exploit Maturity | EPSS | Library | Type | Fixed in | Remediation Available | Reachability |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2022-37601 | 🟣 Critical | 9.3 | Not Defined | 24.6% | loader-utils-1.1.0.tgz | Transitive | N/A | ❌ | |
| CVE-2022-37599 | 🔴 High | 8.7 | Not Defined | 7.1000004% | loader-utils-1.1.0.tgz | Transitive | N/A | ❌ | |
| CVE-2022-37603 | 🔴 High | 8.7 | Not Defined | 1.7% | loader-utils-1.1.0.tgz | Transitive | N/A | ❌ | |
| WS-2019-0063 | 🔴 High | 8.1 | N/A | N/A | js-yaml-3.12.0.tgz | Transitive | N/A | ❌ | |
| WS-2019-0032 | 🔴 High | 7.5 | N/A | N/A | js-yaml-3.12.0.tgz | Transitive | N/A | ❌ | |
| CVE-2021-23368 | 🟠 Medium | 6.9 | Not Defined | < 1% | postcss-7.0.2.tgz | Transitive | N/A | ❌ | |
| CVE-2021-23382 | 🟠 Medium | 6.9 | Not Defined | < 1% | postcss-7.0.2.tgz | Transitive | N/A | ❌ | |
| CVE-2020-15366 | 🟠 Medium | 6.3 | Not Defined | < 1% | ajv-6.5.2.tgz | Transitive | N/A | ❌ |
Details
🟣CVE-2022-37601
Vulnerable Library - loader-utils-1.1.0.tgz
utils for webpack loaders
Library home page: https://registry.npmjs.org/loader-utils/-/loader-utils-1.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/loader-utils/package.json
Dependency Hierarchy:
-
webpack-4.17.1.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
babel-loader-7.1.5.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
postcss-loader-3.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
webpack-cli-3.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
mini-css-extract-plugin-0.4.2.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
sass-loader-7.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
css-loader-1.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
Vulnerability Details
Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.
Publish Date: Oct 12, 2022 12:00 AM
URL: CVE-2022-37601
Threat Assessment
Exploit Maturity:Not Defined
EPSS:24.6%
Score: 9.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-76p3-8jx3-jpfq
Release Date: Oct 12, 2022 12:00 AM
Fix Resolution : loader-utils - 2.0.3,loader-utils - 1.4.1
🔴CVE-2022-37599
Vulnerable Library - loader-utils-1.1.0.tgz
utils for webpack loaders
Library home page: https://registry.npmjs.org/loader-utils/-/loader-utils-1.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/loader-utils/package.json
Dependency Hierarchy:
-
webpack-4.17.1.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
babel-loader-7.1.5.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
postcss-loader-3.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
webpack-cli-3.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
mini-css-extract-plugin-0.4.2.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
sass-loader-7.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
css-loader-1.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
Vulnerability Details
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.
Publish Date: Oct 11, 2022 12:00 AM
URL: CVE-2022-37599
Threat Assessment
Exploit Maturity:Not Defined
EPSS:7.1000004%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-hhq3-ff78-jv3g
Release Date: Oct 11, 2022 12:00 AM
Fix Resolution : loader-utils - 2.0.4,loader-utils - 3.2.1,loader-utils - 1.4.2,https://github.com/webpack/loader-utils.git - no_fix
🔴CVE-2022-37603
Vulnerable Library - loader-utils-1.1.0.tgz
utils for webpack loaders
Library home page: https://registry.npmjs.org/loader-utils/-/loader-utils-1.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/loader-utils/package.json
Dependency Hierarchy:
-
webpack-4.17.1.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
babel-loader-7.1.5.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
postcss-loader-3.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
webpack-cli-3.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
mini-css-extract-plugin-0.4.2.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
sass-loader-7.1.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
-
css-loader-1.0.0.tgz (Root Library)
- ❌ loader-utils-1.1.0.tgz (Vulnerable Library)
Vulnerability Details
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.
Publish Date: Oct 14, 2022 12:00 AM
URL: CVE-2022-37603
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.7%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-3rfm-jhwj-7488
Release Date: Oct 14, 2022 12:00 AM
Fix Resolution : loader-utils - 1.4.2,loader-utils - 3.2.1,loader-utils - 2.0.4
🔴WS-2019-0063
Vulnerable Library - js-yaml-3.12.0.tgz
YAML 1.2 parser and serializer
Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/js-yaml/package.json
Dependency Hierarchy:
-
cssnano-4.1.0.tgz (Root Library)
- cosmiconfig-5.0.6.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-5.0.6.tgz
-
lint-staged-7.2.2.tgz (Root Library)
- cosmiconfig-5.0.6.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-5.0.6.tgz
-
postcss-loader-3.0.0.tgz (Root Library)
- postcss-load-config-2.0.0.tgz
- cosmiconfig-4.0.0.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-4.0.0.tgz
- postcss-load-config-2.0.0.tgz
-
eslint-5.4.0.tgz (Root Library)
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
Vulnerability Details
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
Publish Date: Apr 05, 2019 04:07 PM
URL: WS-2019-0063
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 8.1
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/813
Release Date: Apr 05, 2019 04:07 PM
Fix Resolution : js-yaml - 3.13.1
🔴WS-2019-0032
Vulnerable Library - js-yaml-3.12.0.tgz
YAML 1.2 parser and serializer
Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/js-yaml/package.json
Dependency Hierarchy:
-
cssnano-4.1.0.tgz (Root Library)
- cosmiconfig-5.0.6.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-5.0.6.tgz
-
lint-staged-7.2.2.tgz (Root Library)
- cosmiconfig-5.0.6.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-5.0.6.tgz
-
postcss-loader-3.0.0.tgz (Root Library)
- postcss-load-config-2.0.0.tgz
- cosmiconfig-4.0.0.tgz
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
- cosmiconfig-4.0.0.tgz
- postcss-load-config-2.0.0.tgz
-
eslint-5.4.0.tgz (Root Library)
- ❌ js-yaml-3.12.0.tgz (Vulnerable Library)
Vulnerability Details
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
Publish Date: Mar 20, 2019 05:12 PM
URL: WS-2019-0032
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/788/versions
Release Date: Mar 20, 2019 05:12 PM
Fix Resolution : js-yaml - 3.13.0
🟠CVE-2021-23368
Vulnerable Library - postcss-7.0.2.tgz
Tool for transforming styles with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss-loader/node_modules/postcss/package.json
Dependency Hierarchy:
- postcss-loader-3.0.0.tgz (Root Library)
- ❌ postcss-7.0.2.tgz (Vulnerable Library)
Vulnerability Details
The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
Publish Date: Apr 12, 2021 01:50 PM
URL: CVE-2021-23368
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin: GHSA-hwj9-h5mp-3pm3
Release Date: Apr 12, 2021 01:50 PM
Fix Resolution : postcss - 8.2.10,postcss - 7.0.36
🟠CVE-2021-23382
Vulnerable Library - postcss-7.0.2.tgz
Tool for transforming styles with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss-loader/node_modules/postcss/package.json
Dependency Hierarchy:
- postcss-loader-3.0.0.tgz (Root Library)
- ❌ postcss-7.0.2.tgz (Vulnerable Library)
Vulnerability Details
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern /\s sourceMappingURL=(.*).
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Apr 26, 2021 03:30 PM
URL: CVE-2021-23382
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin: GHSA-566m-qj78-rww5
Release Date: Apr 26, 2021 03:30 PM
Fix Resolution : postcss - 8.2.13,postcss - 7.0.36
🟠CVE-2020-15366
Vulnerable Library - ajv-6.5.2.tgz
Another JSON Schema Validator
Library home page: https://registry.npmjs.org/ajv/-/ajv-6.5.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ajv/package.json
Dependency Hierarchy:
-
webpack-4.17.1.tgz (Root Library)
- ❌ ajv-6.5.2.tgz (Vulnerable Library)
-
postcss-loader-3.0.0.tgz (Root Library)
- schema-utils-1.0.0.tgz
- ❌ ajv-6.5.2.tgz (Vulnerable Library)
- schema-utils-1.0.0.tgz
-
eslint-5.4.0.tgz (Root Library)
- table-4.0.3.tgz
- ❌ ajv-6.5.2.tgz (Vulnerable Library)
- table-4.0.3.tgz
-
mini-css-extract-plugin-0.4.2.tgz (Root Library)
- schema-utils-1.0.0.tgz
- ❌ ajv-6.5.2.tgz (Vulnerable Library)
- schema-utils-1.0.0.tgz
Vulnerability Details
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
Publish Date: Jul 15, 2020 07:14 PM
URL: CVE-2020-15366
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-v88g-cgmw-v5xw
Release Date: Jul 15, 2020 07:14 PM
Fix Resolution : ajv - 6.12.3