opentok-rtc
opentok-rtc copied to clipboard
grunt-autoprefixer-3.0.4.tgz: 3 vulnerabilities (highest severity is: 7.1)
Vulnerable Library - grunt-autoprefixer-3.0.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss/package.json
Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907
Vulnerabilities
| CVE | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (grunt-autoprefixer version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| WS-2018-0590 | 7.1 | Not Defined | diff-1.3.2.tgz | Transitive | N/A* | ❌ | |||
| CVE-2023-44270 | 5.3 | Not Defined | 0.1% | postcss-4.1.16.tgz | Transitive | N/A* | ❌ | ||
| CVE-2021-23382 | 5.3 | Not Defined | 0.2% | postcss-4.1.16.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2018-0590
Vulnerable Library - diff-1.3.2.tgz
A javascript text diff implementation.
Library home page: https://registry.npmjs.org/diff/-/diff-1.3.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/diff/package.json
Dependency Hierarchy:
- grunt-autoprefixer-3.0.4.tgz (Root Library)
- :x: diff-1.3.2.tgz (Vulnerable Library)
Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907
Found in base branch: master
Vulnerability Details
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
Publish Date: 2018-03-05
URL: WS-2018-0590
Threat Assessment
Exploit Maturity: Not Defined
EPSS:
CVSS 3 Score Details (7.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2018-03-05
Fix Resolution: 3.5.0
CVE-2023-44270
Vulnerable Library - postcss-4.1.16.tgz
Tool for transforming CSS with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-4.1.16.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss/package.json
Dependency Hierarchy:
- grunt-autoprefixer-3.0.4.tgz (Root Library)
- :x: postcss-4.1.16.tgz (Vulnerable Library)
Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907
Found in base branch: master
Vulnerability Details
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.
Publish Date: 2023-09-29
URL: CVE-2023-44270
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.1%
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-7fh5-64p2-3v2j
Release Date: 2023-09-29
Fix Resolution: postcss - 8.4.31
CVE-2021-23382
Vulnerable Library - postcss-4.1.16.tgz
Tool for transforming CSS with JS plugins
Library home page: https://registry.npmjs.org/postcss/-/postcss-4.1.16.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss/package.json
Dependency Hierarchy:
- grunt-autoprefixer-3.0.4.tgz (Root Library)
- :x: postcss-4.1.16.tgz (Vulnerable Library)
Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907
Found in base branch: master
Vulnerability Details
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern /*\s* sourceMappingURL=(.*).
Publish Date: 2021-04-26
URL: CVE-2021-23382
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.2%
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382
Release Date: 2021-04-26
Fix Resolution: postcss - 8.2.13