CVE-2022-21222

The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
snykCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
VendorProductVersion
css-what_projectcss-what
𝑥
< 2.1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-css-what
bullseye
4.0.0-3+deb11u1
fixed
bookworm
6.1.0-5
fixed
sid
6.1.0-5
fixed
trixie
6.1.0-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-css-what
noble
needs-triage
mantic
ignored
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
Fixed 3.2.1-1ubuntu0.1~esm1
released
bionic
Fixed 2.1.0-1+deb10u1build0.18.04.1
released
xenial
Fixed 2.1.0-1ubuntu0.16.04.1~esm1
released
trusty
ignored