Vulnerability Name:

CVE-2021-37695 (CCN-207431)

Assigned:2021-08-12
Published:2021-08-12
Updated:2022-02-28
Summary:ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. The problem has been recognized and patched. The fix will be available in version 4.16.2.
CVSS v3 Severity:5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2021-37695

Source: CCN
Type: CKEditor Web site
CKEditor

Source: XF
Type: UNKNOWN
ckeditor-cve202137695-xss(207431)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58

Source: CCN
Type: CKEditor4 GIT Repository
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML

Source: CONFIRM
Type: Third Party Advisory
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20211109 [SECURITY] [DLA 2813-1] ckeditor security update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-51457da891

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-72176a63a8

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-87578dca12

Source: CCN
Type: IBM Security Bulletin 6852451 (Sterling B2B Integrator)
B2B API of IBM Sterling B2B Integrator vulnerable to multiple issues due to CKEditor

Source: CCN
Type: IBM Security Bulletin 6985607 (Engineering Workflow Management)
IBM Engineering Workflow Management (EWM) vulnerabilities CVE-2020-28500, CVE-2021-23337, CVE-2020-8203

Source: CCN
Type: Oracle CPUJan2022
Oracle Critical Patch Update Advisory - January 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html

Source: CCN
Type: Oracle CPUOct2021
Oracle Critical Patch Update Advisory - October 2021

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ckeditor:ckeditor:*:*:*:*:*:*:*:* (Version < 4.16.2)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:oracle:application_express:*:*:*:*:*:*:*:* (Version < 21.1.4)
  • OR cpe:/a:oracle:banking_party_management:2.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:commerce_merchandising:11.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:documaker:12.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:documaker:12.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* (Version >= 8.0.7 and <= 8.1.1)
  • OR cpe:/a:oracle:financial_services_model_management_and_governance:*:*:*:*:*:*:*:* (Version >= 8.0.8.0.0 and <= 8.1.0.0.0)
  • OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* (Version < 9.2.6.0)
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ckeditor:ckeditor:4.16.0:*:*:*:*:node.js:*:*
  • AND
  • cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*
  • OR cpe:/a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.1.0:*:*:*:standard:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.2.0:*:*:*:standard:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ckeditor ckeditor *
    debian debian linux 9.0
    fedoraproject fedora 33
    fedoraproject fedora 34
    fedoraproject fedora 35
    oracle application express *
    oracle banking party management 2.7.0
    oracle commerce guided search 11.3.2
    oracle commerce merchandising 11.3.2
    oracle documaker 12.6.3
    oracle documaker 12.6.4
    oracle financial services analytical applications infrastructure 8.0.3
    oracle financial services analytical applications infrastructure *
    oracle financial services model management and governance *
    oracle jd edwards enterpriseone tools *
    oracle peoplesoft enterprise peopletools 8.57
    oracle peoplesoft enterprise peopletools 8.58
    oracle peoplesoft enterprise peopletools 8.59
    ckeditor ckeditor 4.16.0
    oracle peoplesoft enterprise peopletools 8.57
    ibm sterling b2b integrator 6.0.0.0
    ibm sterling b2b integrator 6.1.0.0
    ibm engineering workflow management 7.0.1
    ibm engineering workflow management 7.0.2
    ibm sterling b2b integrator 6.1.1.0
    ibm sterling b2b integrator 6.1.2.0