First published: Sat Sep 11 2021(Updated: )
Insufficient Regular Expression Complexity in prismjs leads to a Regular Expression Denial of Service (ReDoS) attack. An unauthenticated attacker can exploit this flaw to cause an application to consume an excess amount of CPU by providing a crafted HTML comment as input. This can result in a denial of service attack.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Prismjs Prism | <1.25.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3801 is a vulnerability in prismjs that allows an unauthenticated attacker to cause a denial of service (DoS) attack by exploiting insufficient regular expression complexity.
CVE-2021-3801 works by allowing an attacker to provide a crafted HTML comment as input, causing an application to consume excessive amounts of CPU resources.
The severity of CVE-2021-3801 is rated as high, with a CVSS score of 6.5.
The affected software of CVE-2021-3801 includes Prismjs versions up to exclusive 1.25.0 and Node.js version in the CPE 'cpe:2.3:a:prismjs:prism:*:*:*:*:*:node.js:*:*' up to exclusive 1.25.0.
To remediate CVE-2021-3801, it is recommended to update Prismjs to version 1.25.0 or higher.