CVE-2021-33829

NameCVE-2021-33829
DescriptionA cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2813-1
Debian Bugs1015217

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ckeditor (PTS)bullseye4.16.0+dfsg-2fixed
bookworm4.19.1+dfsg-1fixed
sid, trixie4.22.1+dfsg1-2fixed
ckeditor3 (PTS)bookworm, bullseye, sid, trixie3.6.6.1+dfsg-7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ckeditorsourcestretch4.5.7+dfsg-2+deb9u1DLA-2813-1
ckeditorsource(unstable)4.16.0+dfsg-2
ckeditor3sourcestretch(unfixed)end-of-life
ckeditor3sourcebuster(unfixed)end-of-life
ckeditor3source(unstable)(unfixed)1015217

Notes

[buster] - ckeditor <no-dsa> (Minor issue)
[bookworm] - ckeditor3 <no-dsa> (Minor issue)
[bullseye] - ckeditor3 <no-dsa> (Minor issue)
[buster] - ckeditor3 <end-of-life> (No longer supported in LTS)
[stretch] - ckeditor3 <end-of-life> (EOL'd for stretch)
https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser
https://github.com/ckeditor/ckeditor4/commit/3e426ce34f7fc7bf784624358831ef9e189bb6ed

Search for package or bug name: Reporting problems