All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
References
Link | Resource |
---|---|
https://github.com/sasstools/scss-tokenizer/issues/45 | Exploit Issue Tracking Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 | Exploit Third Party Advisory |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
Information
Published : 2022-07-01 20:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-25758
Mitre link : CVE-2022-25758
CVE.ORG link : CVE-2022-25758
JSON object : View
Products Affected
scss-tokenizer_project
- scss-tokenizer
CWE
CWE-1333
Inefficient Regular Expression Complexity