-
-
Notifications
You must be signed in to change notification settings - Fork 8
Description
Hi, @leodido,
Issue Description
I noticed that a vulnerability is introduced in postcss-clean@1.2.2:
Vulnerability CVE-2021-23382 affects package postcss (versions:<7.0.36,>=8.0.0 <8.2.13): https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
The above vulnerable package is referenced by postcss-clean@1.2.2 via:
postcss-clean@1.2.2 ➔ postcss@6.0.23
Since postcss-clean@1.2.2 (7,316 downloads per week) is referenced by 21 downstream projects (e.g., h5p-nodejs-library 6.2.0 (latest version), nyc-lib 1.4.43 (latest version), @lipemat/js-boilerplate 6.6.0 (latest version), @lumieducation/h5p-html-exporter 8.1.4 (latest version), ah-veeva-exporter 1.4.2 (latest version)), the vulnerability CVE-2021-23382 can be propagated into these downstream projects and expose security threats to them via the following package dependency paths:
(1)@ioiotv/ioio-kit-vue@1.0.16 ➔ @ioiotv/ioio-kit-core@1.0.12 ➔ postcss-clean@1.2.2 ➔ postcss@6.0.23
(2)anthill-cli@0.6.3 ➔ ah-veeva-exporter@1.4.2 ➔ postcss-clean@1.2.2 ➔ postcss@6.0.23
......
If postcss-clean@1.2.* removes the vulnerable package from the above version, then its fixed version can help downstream users decrease their pain.
Given the large number of downstream users, could you help update your package to remove the vulnerability from postcss-clean@1.2.2 ?
Fixing suggestions
In postcss-clean@1.2.3, maybe you can kindly try to perform the following upgrade :
postcss ^6.x ➔ ^7.x;
Note:
postcss@7.0.36(>=7.0.36 <8.0.0) has fixed the vulnerability CVE-2021-23382.
Of course, you are welcome to share other ways to resolve the issue.^_^