Bug ID 1219720
Summary VUL-0: CVE-2024-24815: python-django-ckeditor: attackers could inject malformed HTML content bypassing Advanced Content Filtering mechanism
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/393367/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Other
Assignee dmueller@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC andrea.mattiazzo@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A
cross-site scripting vulnerability has been discovered in the core HTML parsing
module in versions of CKEditor4 prior to 4.24.0-lts. It may affect all editor
instances that enabled full-page editing mode or enabled CDATA elements in
Advanced Content Filtering configuration (defaults to `script` and `style`
elements). The vulnerability allows attackers to inject malformed HTML content
bypassing Advanced Content Filtering mechanism, which could result in executing
JavaScript code. An attacker could abuse faulty CDATA content detection and use
it to prepare an intentional attack on the editor. A fix is available in
version 4.24.0-lts.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24815
https://www.cve.org/CVERecord?id=CVE-2024-24815
https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_dtd.html#property-S-cdata
https://ckeditor.com/docs/ckeditor4/latest/features/fullpage.html)
https://ckeditor.com/docs/ckeditor4/latest/guide/dev_advanced_content_filter.html
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-fq6h-4g8v-qqvm
https://ckeditor.com/docs/ckeditor4/latest/features/fullpage.html

Patch:
https://github.com/ckeditor/ckeditor4/commit/8ed1a3c93d0ae5f49f4ecff5738ab8a2972194cb


You are receiving this mail because: