It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
References
Link | Resource |
---|---|
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416 | Release Notes Third Party Advisory |
https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first | Vendor Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Not Applicable Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-01-26 13:15
Updated : 2022-03-01 09:18
NVD link : CVE-2021-26272
Mitre link : CVE-2021-26272
JSON object : View
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
Products Affected
oracle
- siebel_ui_framework
- commerce_merchandising
- financial_services_analytical_applications_infrastructure
- webcenter_sites
- application_express
- jd_edwards_enterpriseone_tools
- agile_plm
- financial_services_model_management_and_governance
- banking_party_management
ckeditor
- ckeditor