Vulnerability Description
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prismjs | Prism | < 1.24.0 |
| Oracle | Application Express | < 21.1.4 |
Related Weaknesses (CWE)
References
- https://github.com/PrismJS/prism/pull/2688PatchThird Party Advisory
- https://github.com/PrismJS/prism/pull/2774PatchThird Party Advisory
- https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hgThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2022.htmlPatchThird Party Advisory
- https://github.com/PrismJS/prism/pull/2688PatchThird Party Advisory
- https://github.com/PrismJS/prism/pull/2774PatchThird Party Advisory
- https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hgThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2022.htmlPatchThird Party Advisory
FAQ
What is CVE-2021-32723?
CVE-2021-32723 is a vulnerability with a CVSS score of 7.4 (HIGH). Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an att...
How severe is CVE-2021-32723?
CVE-2021-32723 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32723?
Check the references section above for vendor advisories and patch information. Affected products include: Prismjs Prism, Oracle Application Express.