Description
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.
Remediation
References
https://github.com/github/advisory-database/issues/2820
https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25
https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5
https://github.com/postcss/postcss/releases/tag/8.4.31
Related Vulnerabilities
CVE-2014-6071 Vulnerability in maven package org.webjars:jquery
CVE-2022-36079 Vulnerability in npm package parse-server
CVE-2022-35924 Vulnerability in npm package next-auth
CVE-2021-21290 Vulnerability in maven package io.netty:netty-transport-native-unix-common-tests
CVE-2023-43642 Vulnerability in maven package org.xerial.snappy:snappy-java