CVE-2022-21222

EUVD-2022-7138
The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
snykCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
Affected Products (NVD)
VendorProductVersion
css-what_projectcss-what
𝑥
< 2.1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-css-what
bookworm
6.1.0-5
fixed
bullseye
4.0.0-3+deb11u1
fixed
sid
6.1.0-5
fixed
trixie
6.1.0-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-css-what
bionic
Fixed 2.1.0-1+deb10u1build0.18.04.1
released
focal
Fixed 3.2.1-1ubuntu0.1~esm1
released
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
ignored
noble
needs-triage
trusty
ignored
xenial
Fixed 2.1.0-1ubuntu0.16.04.1~esm1
released