-
-
Notifications
You must be signed in to change notification settings - Fork 231
Expand file tree
/
Copy pathCVE-2021-41165.yml
More file actions
35 lines (31 loc) · 1.63 KB
/
CVE-2021-41165.yml
File metadata and controls
35 lines (31 loc) · 1.63 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
---
gem: ckeditor
cve: 2021-41165
ghsa: 7h26-63m7-qhf2
url: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
title: HTML comments vulnerability allowing to execute JavaScript code
date: 2021-11-17
description: |
### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.17.0.
### For more information
Email us at [email protected] if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
cvss_v3: 8.2
patched_versions:
- ">= 5.1.2"
related:
url:
- https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2
- https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417
- https://nvd.nist.gov/vuln/detail/CVE-2021-41165
- https://www.drupal.org/sa-core-2021-011
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/advisories/GHSA-7h26-63m7-qhf2