Vulnerability Description
Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sass-Lang | Libsass | 3.6.5-8-g210218 |
| Sass-Lang | Sassc | 3.6.2 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/1aC5q3czen0atI91fuBIoCBFkS30_OSWX/ExploitPermissions RequiredThird Party Advisory
- https://github.com/sass/libsassProduct
- https://github.com/sass/libsass/issues/3177ExploitIssue TrackingVendor Advisory
- https://drive.google.com/file/d/1aC5q3czen0atI91fuBIoCBFkS30_OSWX/ExploitPermissions RequiredThird Party Advisory
- https://github.com/sass/libsassProduct
- https://github.com/sass/libsass/issues/3177ExploitIssue TrackingVendor Advisory
FAQ
What is CVE-2022-43357?
CVE-2022-43357 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (D...
How severe is CVE-2022-43357?
CVE-2022-43357 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43357?
Check the references section above for vendor advisories and patch information. Affected products include: Sass-Lang Libsass, Sass-Lang Sassc.