Lucene search

K
githubGitHub Advisory DatabaseGHSA-P28H-CC7Q-C4FG
HistoryOct 01, 2022 - 12:00 a.m.

css-what vulnerable to ReDoS due to use of insecure regular expression

2022-10-0100:00:24
CWE-400
GitHub Advisory Database
github.com
9
vulnerable
redos
regular expression
index.js
parse function
software

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

50.0%

The package css-what before 2.1.3 is vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.

Affected configurations

Vulners
Node
csswhatRange<2.1.3
CPENameOperatorVersion
css-whatlt2.1.3

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

50.0%