It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Ckeditor
Subscribe
|
Ckeditor
Subscribe
|
|
Oracle
Subscribe
|
Agile Plm
Subscribe
Application Express
Subscribe
Banking Party Management
Subscribe
Commerce Merchandising
Subscribe
Financial Services Analytical Applications Infrastructure
Subscribe
Financial Services Model Management And Governance
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Siebel Ui Framework
Subscribe
Webcenter Sites
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2267 | It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). |
Github GHSA |
GHSA-wpvm-wqr4-p7cw | Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4 |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:19:20.393Z
Reserved: 2021-01-26T00:00:00
Link: CVE-2021-26272
No data.
Status : Modified
Published: 2021-01-26T21:15:12.923
Modified: 2024-11-21T05:56:00.900
Link: CVE-2021-26272
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA