Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High severity vulnerability in nth-check - Regular Expression Denial of Service (ReDoS) #204

Open
kis opened this issue Oct 12, 2023 · 1 comment

Comments

@kis
Copy link

kis commented Oct 12, 2023

Introduced through
@iconscout/[email protected]
Fixed in
[email protected]

https://security.snyk.io/vuln/SNYK-JS-NTHCHECK-1586032

Detailed paths
Introduced through: [email protected] › @iconscout/[email protected][email protected][email protected][email protected]
Fix: No remediation path available.

Security information
Factors contributing to the scoring:
Snyk: CVSS 7.5 - High Severity

NVD: CVSS 7.5 - High Severity

Overview
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) when parsing crafted invalid CSS nth-checks, due to the sub-pattern \s*(?:([+-]?)\s*(\d+))? in RE_NTH_ELEMENT with quantified overlapping adjacency.

@kis
Copy link
Author

kis commented Oct 12, 2023

@tarunmangukiya @akandeBolaji @ladumorrajani @imzedi hey team! could you please bump svgo dependency to newer version and make a new release to fix this high severity vulnerability found with Snyk? https://security.snyk.io/vuln/SNYK-JS-NTHCHECK-1586032

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant