Description
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text.
Remediation
References
https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg
https://github.com/PrismJS/prism/pull/2688
https://github.com/PrismJS/prism/pull/2774
https://www.oracle.com/security-alerts/cpujan2022.html
Related Vulnerabilities
CVE-2015-2912 Vulnerability in maven package com.orientechnologies:orientdb-core
CVE-2020-7009 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2020-36185 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind