First published: Fri Aug 07 2020(Updated: )
Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). This problem is fixed in version 1.21.0. To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prismjs Previewers | >=1.1.0<1.21.0 | |
Apple Safari | ||
Microsoft Internet Explorer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15138 is a vulnerability in Prism where the easing preview of the Previewers plugin has a Cross-Site Scripting (XSS) vulnerability.
All Safari and Internet Explorer users of Prism >= v1.1.0 that use the Previewers plugin are affected by CVE-2020-15138.
An attacker can exploit CVE-2020-15138 by executing arbitrary code through the XSS vulnerability in the easing preview of the Previewers plugin in Safari and Internet Explorer.
CVE-2020-15138 has a severity rating of 7.5 (High).
To fix CVE-2020-15138, update Prism to a version higher than or equal to v1.1.0 and disable the Previewers plugin, or apply the patch provided by PrismJS.