8.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:P/A:P
0.003 Low
EPSS
Percentile
71.2%
Highlight.js is a syntax highlighter written in JavaScript. Highlight.js
versions before 9.18.2 and 10.1.2 are vulnerable to Prototype Pollution. A
malicious HTML code block can be crafted that will result in prototype
pollution of the base object’s prototype during highlighting. If you allow
users to insert custom HTML code blocks into your page/app via parsing
Markdown code blocks (or similar) and do not filter the language names the
user can provide you may be vulnerable. The pollution should just be
harmless data but this can cause problems for applications not expecting
these properties to exist and can result in strange behavior or application
crashes, i.e. a potential DOS vector. If your website or application does
not render user provided data it should be unaffected. Versions 9.18.2 and
10.1.2 and newer include fixes for this vulnerability. If you are using
version 7 or 8 you are encouraged to upgrade to a newer release.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | highlight.js | < any | UNKNOWN |
ubuntu | 20.04 | noarch | highlight.js | < any | UNKNOWN |
ubuntu | 22.04 | noarch | highlight.js | < any | UNKNOWN |
ubuntu | 23.10 | noarch | highlight.js | < any | UNKNOWN |
ubuntu | 24.04 | noarch | highlight.js | < any | UNKNOWN |
ubuntu | 16.04 | noarch | highlight.js | < any | UNKNOWN |
github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0
github.com/highlightjs/highlight.js/pull/2636
github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx
launchpad.net/bugs/cve/CVE-2020-26237
nvd.nist.gov/vuln/detail/CVE-2020-26237
security-tracker.debian.org/tracker/CVE-2020-26237
www.cve.org/CVERecord?id=CVE-2020-26237
www.npmjs.com/package/highlight.js
8.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:N/I:P/A:P
0.003 Low
EPSS
Percentile
71.2%