Name | CVE-2021-26271 |
Description | It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 982587, 1015217 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ckeditor (PTS) | buster | 4.11.1+dfsg-1 | vulnerable |
| bullseye | 4.16.0+dfsg-2 | fixed |
| bookworm, sid | 4.19.1+dfsg-1 | fixed |
ckeditor3 (PTS) | buster | 3.6.6.1+dfsg-3 | vulnerable |
| bookworm, sid, bullseye | 3.6.6.1+dfsg-7 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[buster] - ckeditor <no-dsa> (Minor issue)
[stretch] - ckeditor <postponed> (Fix along next DLA)
[bullseye] - ckeditor3 <no-dsa> (Minor issue)
[buster] - ckeditor3 <end-of-life> (No longer supported in LTS)
[stretch] - ckeditor3 <end-of-life> (EOL'd for stretch)
https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416