PrismJS Prism 1.22.0 for Node.js

CPE Details

PrismJS Prism 1.22.0 for Node.js
1.22.0
2021-02-23
11h50 +00:00
2021-02-23
11h50 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:prismjs:prism:1.22.0:*:*:*:*:node.js:*:*

Informations

Vendor

prismjs

Product

prism

Version

1.22.0

Target Software

node.js

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-23647 2022-02-18 13h50 +00:00 Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.
7.5
High
CVE-2021-3801 2021-09-15 10h40 +00:00 prism is vulnerable to Inefficient Regular Expression Complexity
6.5
Medium
CVE-2021-32723 2021-06-28 17h15 +00:00 Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
7.4
High
CVE-2021-23341 2021-02-18 16h00 +00:00 The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components.
7.5
High