prismjs prism CVE-2021-32723 in Prismjs and Oracle Products
Published on June 28, 2021

Regular Expression Denial of Service (ReDoS) in Prism

product logo product logo
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.

Github Repository NVD

Vulnerability Analysis

CVE-2021-32723 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2021-32723 has been classified to as a Resource Exhaustion vulnerability or weakness.


Products Associated with CVE-2021-32723

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-32723 are published in these products:

 
 

Affected Versions

PrismJS prism Version < 1.24 is affected by CVE-2021-32723

Vulnerable Packages

The following package name and versions may be associated with CVE-2021-32723

Package Manager Vulnerable Package Versions Fixed In
npm prismjs < 1.24.0 1.24.0

Exploit Probability

EPSS
0.37%
Percentile
58.51%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.