CVE-2024-53382 (Medium) detected in prismjs-1.27.0.tgz, prismjs-1.29.0.tgz
Opened this issue · 0 comments
CVE-2024-53382 - Medium Severity Vulnerability
Vulnerable Libraries - prismjs-1.27.0.tgz, prismjs-1.29.0.tgz
prismjs-1.27.0.tgz
Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.
Library home page: https://registry.npmjs.org/prismjs/-/prismjs-1.27.0.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/package.json
Dependency Hierarchy:
- @postgres.ai/shared-1.0.0.tgz (Root Library)
- react-syntax-highlighter-15.5.0.tgz
- refractor-3.6.0.tgz
- ❌ prismjs-1.27.0.tgz (Vulnerable Library)
- refractor-3.6.0.tgz
- react-syntax-highlighter-15.5.0.tgz
prismjs-1.29.0.tgz
Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.
Library home page: https://registry.npmjs.org/prismjs/-/prismjs-1.29.0.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/package.json
Dependency Hierarchy:
- @postgres.ai/shared-1.0.0.tgz (Root Library)
- react-syntax-highlighter-15.5.0.tgz
- ❌ prismjs-1.29.0.tgz (Vulnerable Library)
- react-syntax-highlighter-15.5.0.tgz
Found in base branch: master
Vulnerability Details
Prism (aka PrismJS) through 1.29.0 allows DOM Clobbering (with resultant XSS for untrusted input that contains HTML but does not directly contain JavaScript), because document.currentScript lookup can be shadowed by attacker-injected HTML elements.
Publish Date: 2025-03-03
URL: CVE-2024-53382
CVSS 3 Score Details (4.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-53382
Release Date: 2025-03-03
Fix Resolution: lanos/yetiweb - no_fix
Step up your Open Source Security Game with Mend here