Skip to content
This repository has been archived by the owner on Mar 7, 2022. It is now read-only.

fix(deps): update dependency prismjs to v1.25.0 [security] #29

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Aug 21, 2020

WhiteSource Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
prismjs 1.15.0 -> 1.25.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2020-15138

Impact

The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer.

This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the Previewers plugin (>=v1.10.0) or the Previewer: Easing plugin (v1.1.0 to v1.9.0).

Patches

This problem is patched in v1.21.0.

Workarounds

To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.

References

The vulnerability was introduced by this commit on Sep 29, 2015 and fixed by Masato Kinugawa (#​2506).

For more information

If you have any questions or comments about this advisory, please open an issue.

CVE-2021-23341

The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components.

CVE-2021-32723

Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).

Impact

When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text.

  • ASCIIDoc
  • ERB

Other languages are not affected and can be used to highlight untrusted text.

Patches

This problem has been fixed in Prism v1.24.

References

  • PrismJS/prism#​2774
  • PrismJS/prism#​2688

CVE-2021-3801

The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.


Release Notes

PrismJS/prism

v1.25.0

Compare Source

New components
Updated components
Updated plugins
Updated themes
  • Twilight
Other

v1.24.1

Compare Source

Updated components
Updated plugins

v1.24.0

Compare Source

New components
Updated components
Updated plugins
Other

v1.23.0

Compare Source

New components
Updated components
Updated plugins
Other

v1.22.0

Compare Source

New components
Updated components
Updated plugins
Other

v1.21.0

Compare Source

New components
Updated components

Configuration

📅 Schedule: "" (UTC).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box.

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate renovate bot force-pushed the renovate/npm-prismjs-vulnerability branch from 47fd2ba to 1a47e79 Compare October 28, 2020 13:01
@renovate renovate bot force-pushed the renovate/npm-prismjs-vulnerability branch from 1a47e79 to 0140231 Compare January 6, 2021 20:00
@renovate renovate bot force-pushed the renovate/npm-prismjs-vulnerability branch from 0140231 to ac27e22 Compare April 26, 2021 15:49
@renovate renovate bot changed the title fix(deps): update dependency prismjs to v1.21.0 [security] fix(deps): update dependency prismjs to v1.23.0 [security] Apr 26, 2021
@renovate renovate bot changed the title fix(deps): update dependency prismjs to v1.23.0 [security] fix(deps): update dependency prismjs to v1.25.0 [security] Oct 18, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant