-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - cssnano-3.10.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/is-svg/package.json
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (cssnano version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| WS-2021-0152 | 7.5 | color-string-0.3.0.tgz | Transitive | 4.0.0-nightly.2020.1.9 | ❌ | |
| CVE-2021-33502 | 7.5 | normalize-url-1.9.1.tgz | Transitive | N/A* | ❌ | |
| CVE-2021-29059 | 7.5 | is-svg-2.1.0.tgz | Transitive | 4.0.0-nightly.2020.1.9 | ❌ | |
| CVE-2021-28092 | 7.5 | is-svg-2.1.0.tgz | Transitive | 4.0.0-nightly.2020.1.9 | ❌ | |
| CVE-2021-29060 | 5.3 | color-string-0.3.0.tgz | Transitive | 4.0.0-nightly.2020.1.9 | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2021-0152
Vulnerable Library - color-string-0.3.0.tgz
Parser and generator for CSS color strings
Library home page: https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/color-string/package.json
Dependency Hierarchy:
- cssnano-3.10.0.tgz (Root Library)
- postcss-colormin-2.2.2.tgz
- colormin-1.1.2.tgz
- color-0.11.4.tgz
- ❌ color-string-0.3.0.tgz (Vulnerable Library)
- color-0.11.4.tgz
- colormin-1.1.2.tgz
- postcss-colormin-2.2.2.tgz
Found in base branch: master
Vulnerability Details
Regular Expression Denial of Service (ReDoS) was found in color-string before 1.5.5.
Publish Date: 2021-03-12
URL: WS-2021-0152
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2021-03-12
Fix Resolution (color-string): 1.5.5
Direct dependency fix Resolution (cssnano): 4.0.0-nightly.2020.1.9
Step up your Open Source Security Game with Mend here
CVE-2021-33502
Vulnerable Library - normalize-url-1.9.1.tgz
Normalize a URL
Library home page: https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/normalize-url/package.json
Dependency Hierarchy:
- cssnano-3.10.0.tgz (Root Library)
- postcss-normalize-url-3.0.8.tgz
- ❌ normalize-url-1.9.1.tgz (Vulnerable Library)
- postcss-normalize-url-3.0.8.tgz
Found in base branch: master
Vulnerability Details
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
Publish Date: 2021-05-24
URL: CVE-2021-33502
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
Release Date: 2021-05-24
Fix Resolution: normalize-url - 4.5.1,5.3.1,6.0.1
Step up your Open Source Security Game with Mend here
CVE-2021-29059
Vulnerable Library - is-svg-2.1.0.tgz
Check if a string or buffer is SVG
Library home page: https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/is-svg/package.json
Dependency Hierarchy:
- cssnano-3.10.0.tgz (Root Library)
- postcss-svgo-2.1.6.tgz
- ❌ is-svg-2.1.0.tgz (Vulnerable Library)
- postcss-svgo-2.1.6.tgz
Found in base branch: master
Vulnerability Details
A vulnerability was discovered in IS-SVG version 2.1.0 to 4.2.2 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
Publish Date: 2021-06-21
URL: CVE-2021-29059
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2021-06-21
Fix Resolution (is-svg): 4.3.0
Direct dependency fix Resolution (cssnano): 4.0.0-nightly.2020.1.9
Step up your Open Source Security Game with Mend here
CVE-2021-28092
Vulnerable Library - is-svg-2.1.0.tgz
Check if a string or buffer is SVG
Library home page: https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/is-svg/package.json
Dependency Hierarchy:
- cssnano-3.10.0.tgz (Root Library)
- postcss-svgo-2.1.6.tgz
- ❌ is-svg-2.1.0.tgz (Vulnerable Library)
- postcss-svgo-2.1.6.tgz
Found in base branch: master
Vulnerability Details
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
Publish Date: 2021-03-12
URL: CVE-2021-28092
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28092
Release Date: 2021-03-12
Fix Resolution (is-svg): 4.2.2
Direct dependency fix Resolution (cssnano): 4.0.0-nightly.2020.1.9
Step up your Open Source Security Game with Mend here
CVE-2021-29060
Vulnerable Library - color-string-0.3.0.tgz
Parser and generator for CSS color strings
Library home page: https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/color-string/package.json
Dependency Hierarchy:
- cssnano-3.10.0.tgz (Root Library)
- postcss-colormin-2.2.2.tgz
- colormin-1.1.2.tgz
- color-0.11.4.tgz
- ❌ color-string-0.3.0.tgz (Vulnerable Library)
- color-0.11.4.tgz
- colormin-1.1.2.tgz
- postcss-colormin-2.2.2.tgz
Found in base branch: master
Vulnerability Details
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Color-String version 1.5.5 and below which occurs when the application is provided and checks a crafted invalid HWB string.
Publish Date: 2021-06-21
URL: CVE-2021-29060
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-257v-vj4p-3w2h
Release Date: 2021-06-21
Fix Resolution (color-string): 1.5.5
Direct dependency fix Resolution (cssnano): 4.0.0-nightly.2020.1.9
Step up your Open Source Security Game with Mend here