ckeditor3: CVE-2014-5191 CVE-2018-17960 CVE-2021-26271 CVE-2021-33829 CVE-2021-37695 CVE-2021-41165 CVE-2022-24728 CVE-2022-24729

Debian Bug report logs - #1015217
ckeditor3: CVE-2014-5191 CVE-2018-17960 CVE-2021-26271 CVE-2021-33829 CVE-2021-37695 CVE-2021-41165 CVE-2022-24728 CVE-2022-24729

Reported by: Moritz Mühlenhoff <jmm@inutil.org>

Date: Sun, 17 Jul 2022 20:00:02 UTC

Severity: important

Tags: security

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Horde Maintainers <team+debian-horde-team@tracker.debian.org>:
Bug#1015217; Package src:ckeditor3. (Sun, 17 Jul 2022 20:00:03 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Horde Maintainers <team+debian-horde-team@tracker.debian.org>. (Sun, 17 Jul 2022 20:00:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: submit@bugs.debian.org
Subject: ckeditor3: CVE-2014-5191 CVE-2018-17960 CVE-2021-26271 CVE-2021-33829 CVE-2021-37695 CVE-2021-41165 CVE-2022-24728 CVE-2022-24729
Date: Sun, 17 Jul 2022 21:56:53 +0200
Source: ckeditor3
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for ckeditor4, but it
needs to be checked to which extent ckeditor3 is affected and the
patches in question backported.

CVE-2014-5191[0]:
| Cross-site scripting (XSS) vulnerability in the Preview plugin before
| 4.4.3 in CKEditor allows remote attackers to inject arbitrary web
| script or HTML via unspecified vectors.

https://dev.ckeditor.com/browser/CKEditor/trunk/_source/plugins/preview/preview.html?rev=7706 (v3.6.x)
https://github.com/ckeditor/ckeditor4/commit/b685874c6bc873a76e6e95916c43840a2b7ab08a (v4.4.3)

CVE-2018-17960[1]:
| CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a
| source-mode paste.

CVE-2021-26271[2]:
| It was possible to execute a ReDoS-type attack inside CKEditor 4
| before 4.16 by persuading a victim to paste crafted text into the
| Styles input of specific dialogs (in the Advanced Tab for Dialogs
| plugin).

https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416

CVE-2021-33829[3]:
| A cross-site scripting (XSS) vulnerability in the HTML Data Processor
| in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote
| attackers to inject executable JavaScript code through a crafted
| comment because --!&gt; is mishandled.

https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser
https://github.com/ckeditor/ckeditor4/commit/3e426ce34f7fc7bf784624358831ef9e189bb6ed

CVE-2021-37695[4]:
| ckeditor is an open source WYSIWYG HTML editor with rich content
| support. A potential vulnerability has been discovered in CKEditor 4
| [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package.
| The vulnerability allowed to inject malformed Fake Objects HTML, which
| could result in executing JavaScript code. It affects all users using
| the CKEditor 4 plugins listed above at version &lt; 4.16.2. The
| problem has been recognized and patched. The fix will be available in
| version 4.16.2.

https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc
https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58

CVE-2021-41165[5]:
| CKEditor4 is an open source WYSIWYG HTML editor. In affected version a
| vulnerability has been discovered in the core HTML processing module
| and may affect all plugins used by CKEditor 4. The vulnerability
| allowed to inject malformed comments HTML bypassing content
| sanitization, which could result in executing JavaScript code. It
| affects all users using the CKEditor 4 at version &lt; 4.17.0. The
| problem has been recognized and patched. The fix will be available in
| version 4.17.0.

https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h46-63m7-qhf2 (v4.17.0)

CVE-2022-24728[6]:
| CKEditor4 is an open source what-you-see-is-what-you-get HTML editor.
| A vulnerability has been discovered in the core HTML processing module
| and may affect all plugins used by CKEditor 4 prior to version 4.18.0.
| The vulnerability allows someone to inject malformed HTML bypassing
| content sanitization, which could result in executing JavaScript code.
| This problem has been patched in version 4.18.0. There are currently
| no known workarounds.

https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89
https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949 (4.18.0)

CVE-2022-24729[7]:
| CKEditor4 is an open source what-you-see-is-what-you-get HTML editor.
| CKEditor4 prior to version 4.18.0 contains a vulnerability in the
| `dialog` plugin. The vulnerability allows abuse of a dialog input
| validator regular expression, which can cause a significant
| performance drop resulting in a browser tab freeze. A patch is
| available in version 4.18.0. There are currently no known workarounds.

https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-f6rf-9m92-x2hh
	
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-5191
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5191
[1] https://security-tracker.debian.org/tracker/CVE-2018-17960
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17960
[2] https://security-tracker.debian.org/tracker/CVE-2021-26271
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26271
[3] https://security-tracker.debian.org/tracker/CVE-2021-33829
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33829
[4] https://security-tracker.debian.org/tracker/CVE-2021-37695
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37695
[5] https://security-tracker.debian.org/tracker/CVE-2021-41165
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41165
[6] https://security-tracker.debian.org/tracker/CVE-2022-24728
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24728
[7] https://security-tracker.debian.org/tracker/CVE-2022-24729
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24729

Please adjust the affected versions in the BTS as needed.



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Jul 18 13:16:05 2022; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.