Description
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.
Remediation
References
https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25
https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5
https://github.com/postcss/postcss/releases/tag/8.4.31
https://github.com/github/advisory-database/issues/2820
Related Vulnerabilities
CVE-2021-23337 Vulnerability in maven package org.webjars:lodash
CVE-2015-7499 Vulnerability in npm package libxmljs
CVE-2018-14041 Vulnerability in maven package org.webjars:bootstrap
CVE-2022-25979 Vulnerability in maven package org.webjars.npm:jsuites
CVE-2023-33544 Vulnerability in maven package io.hawt:hawtio-system