First published: Mon Jun 28 2021(Updated: )
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
PrismJS | <1.24.0 | |
Oracle Application Express | <21.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32723 is a vulnerability in Prism, a syntax highlighting library, where some languages before version 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).
CVE-2021-32723 affects Prism by allowing an attacker to craft a string that will cause a very long time to highlight when untrusted (user-given) text is used for highlighting.
The severity of CVE-2021-32723 is high with a CVSS score of 6.5.
Versions of Prism before 1.24.0 are affected by CVE-2021-32723.
To fix the CVE-2021-32723 vulnerability in Prism, update to version 1.24.0 or newer.