The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640 | third party advisory patch exploit |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641 | third party advisory patch exploit |
https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956 | third party advisory patch |