CVE-2020-15138
Published: 7 August 2020
Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). This problem is fixed in version 1.21.0. To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
Priority
Status
Package | Release | Status |
---|---|---|
node-prismjs Launchpad, Ubuntu, Debian |
hirsute |
Not vulnerable
(1.11.0+dfsg-4)
|
impish |
Not vulnerable
(1.11.0+dfsg-4)
|
|
kinetic |
Not vulnerable
(1.11.0+dfsg-4)
|
|
bionic |
Does not exist
|
|
focal |
Needed
|
|
groovy |
Not vulnerable
(1.11.0+dfsg-4)
|
|
jammy |
Not vulnerable
(1.11.0+dfsg-4)
|
|
lunar |
Not vulnerable
(1.11.0+dfsg-4)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.21.0)
|
|
xenial |
Does not exist
|
|
mantic |
Not vulnerable
(1.11.0+dfsg-4)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15138
- https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c
- https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9
- https://prismjs.com/plugins/previewers/#disabling-a-previewer
- NVD
- Launchpad
- Debian