You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /deps/npm/docs/package.json
Path to vulnerable library: /deps/npm/docs/package.json
Dependency Hierarchy:
❌ prismjs-1.21.0.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
mend-bolt-for-githubbot
changed the title
CVE-2021-32723 (High) detected in prismjs-1.21.0.tgz
CVE-2021-32723 (Medium) detected in prismjs-1.21.0.tgz
Aug 15, 2021
mend-bolt-for-githubbot
changed the title
CVE-2021-32723 (Medium) detected in prismjs-1.21.0.tgz
CVE-2021-32723 (Medium) detected in prismjs-1.21.0.tgz - autoclosed
Apr 21, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2021-32723 (Medium) detected in prismjs-1.21.0.tgz - autoclosed
CVE-2021-32723 (Medium) detected in prismjs-1.21.0.tgz
Apr 26, 2023
CVE-2021-32723 - Medium Severity Vulnerability
Vulnerable Library - prismjs-1.21.0.tgz
Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.
Library home page: https://registry.npmjs.org/prismjs/-/prismjs-1.21.0.tgz
Path to dependency file: /deps/npm/docs/package.json
Path to vulnerable library: /deps/npm/docs/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
Publish Date: 2021-06-28
URL: CVE-2021-32723
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-gj77-59wh-66hg
Release Date: 2021-06-28
Fix Resolution: 1.24.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: