Name | CVE-2021-33829 |
Description | A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2813-1 |
Debian Bugs | 1015217 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ckeditor (PTS) | bullseye | 4.16.0+dfsg-2 | fixed |
| bookworm | 4.19.1+dfsg-1 | fixed |
| sid, trixie | 4.22.1+dfsg1-2 | fixed |
ckeditor3 (PTS) | sid, trixie, bookworm, bullseye | 3.6.6.1+dfsg-7 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[buster] - ckeditor <no-dsa> (Minor issue)
[bookworm] - ckeditor3 <ignored> (Minor issue, only used by Horde editor)
[bullseye] - ckeditor3 <no-dsa> (Minor issue)
[buster] - ckeditor3 <end-of-life> (No longer supported in LTS)
[stretch] - ckeditor3 <end-of-life> (EOL'd for stretch)
https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser
https://github.com/ckeditor/ckeditor4/commit/3e426ce34f7fc7bf784624358831ef9e189bb6ed