It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin).
References
Link | Resource |
---|---|
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416 | Release Notes Third Party Advisory |
https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first | Vendor Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-01-26 13:15
Updated : 2021-12-01 08:16
NVD link : CVE-2021-26271
Mitre link : CVE-2021-26271
JSON object : View
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
Products Affected
oracle
- siebel_ui_framework
- financial_services_analytical_applications_infrastructure
- webcenter_sites
- application_express
- jd_edwards_enterpriseone_tools
- agile_plm
ckeditor
- ckeditor