← Retour aux CVEs
CVE-2021-32808
HIGH7.6
Description
ckeditor is an open source WYSIWYG HTML editor with rich content support. A vulnerability has been discovered in the clipboard Widget plugin if used alongside the undo feature. The vulnerability allows a user to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0. The problem has been recognized and patched. The fix will be available in version 4.16.2.
Details CVE
Score CVSS v3.17.6
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie8/12/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
ckeditor:ckeditorfedoraproject:fedoraoracle:application_expressoracle:banking_party_managementoracle:commerce_guided_searchoracle:commerce_merchandisingoracle:documakeroracle:financial_services_analytical_applications_infrastructureoracle:financial_services_model_management_and_governanceoracle:jd_edwards_enterpriseone_toolsoracle:peoplesoft_enterprise_peopletoolsoracle:siebel_ui_frameworkoracle:webcenter_sites
Faiblesses (CWE)
CWE-79CWE-79
References
https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2(security-advisories@github.com)
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpujan2022.html(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpuoct2021.html(security-advisories@github.com)
https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.