Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.
References
| Link | Resource |
|---|---|
| https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/pull/3341 | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 | Third Party Advisory |
| https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/pull/3341 | Patch Third Party Advisory |
| https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-02-18 15:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-23647
Mitre link : CVE-2022-23647
CVE.ORG link : CVE-2022-23647
JSON object : View
Products Affected
prismjs
- prism
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
