All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
References
Link | Resource |
---|---|
https://github.com/sasstools/scss-tokenizer/issues/45 | Exploit Issue Tracking Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-07-01 20:15
Updated : 2023-08-08 14:22
NVD link : CVE-2022-25758
Mitre link : CVE-2022-25758
CVE.ORG link : CVE-2022-25758
JSON object : View
Products Affected
scss-tokenizer_project
- scss-tokenizer
CWE
CWE-1333
Inefficient Regular Expression Complexity