Closed mend-bolt-for-github[bot] closed 9 months ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2020-15138 - High Severity Vulnerability
Vulnerable Library - prismjs-1.20.0.tgz
Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.
Library home page: https://registry.npmjs.org/prismjs/-/prismjs-1.20.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/prismjs/package.json
Dependency Hierarchy: - preset-classic-2.0.0-alpha.56.tgz (Root Library) - theme-classic-2.0.0-alpha.56.tgz - :x: **prismjs-1.20.0.tgz** (Vulnerable Library)
Found in HEAD commit: f6e3e95e235f7fedb000e78d4c59c33780b0dfaa
Found in base branch: master
Vulnerability Details
Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). This problem is fixed in version 1.21.0. To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
Publish Date: 2020-08-07
URL: CVE-2020-15138
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2020-08-28
Fix Resolution (prismjs): 1.21.0
Direct dependency fix Resolution (@docusaurus/preset-classic): 2.0.0
Step up your Open Source Security Game with Mend here