CVE-2021-32723
Summary
| CVE | CVE-2021-32723 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-28 20:15:00 UTC |
| Updated | 2022-03-28 16:16:00 UTC |
| Description | Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Tests: Exhaustive pattern tests by RunDevelopment · Pull Request #2688 · PrismJS/prism · GitHub |
MISC |
github.com |
|
| Updated refa + fixed 2 cases of exponential backtracking by RunDevelopment · Pull Request #2774 · PrismJS/prism · GitHub |
MISC |
github.com |
|
| Oracle Critical Patch Update Advisory - January 2022 |
MISC |
www.oracle.com |
|
| Regular Expression Denial of Service (ReDoS) in Prism · Advisory · PrismJS/prism · GitHub |
CONFIRM |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 982026 Nodejs (npm) Security Update for prismjs (GHSA-gj77-59wh-66hg)