Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.
References
| Link | Resource |
|---|---|
| https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/pull/3341 | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 | Third Party Advisory |
| https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/pull/3341 | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:49
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
| References | () https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c - Patch, Third Party Advisory | |
| References | () https://github.com/PrismJS/prism/pull/3341 - Patch, Third Party Advisory | |
| References | () https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 - Third Party Advisory |
28 Feb 2022, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:prismjs:prism:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
| References | (CONFIRM) https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 - Third Party Advisory | |
| References | (MISC) https://github.com/PrismJS/prism/pull/3341 - Patch, Third Party Advisory | |
| References | (MISC) https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c - Patch, Third Party Advisory |
18 Feb 2022, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-02-18 15:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-23647
Mitre link : CVE-2022-23647
CVE.ORG link : CVE-2022-23647
JSON object : View
Products Affected
prismjs
- prism
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
