CVE-2022-24729

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24729
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24729.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24729
Aliases
Related
Published
2022-03-16T17:15:07Z
Modified
2024-11-06T18:00:56.189226Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the dialog plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.

References

Affected packages

Debian:11 / ckeditor

Package

Name
ckeditor
Purl
pkg:deb/debian/ckeditor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.16.0+dfsg-2
4.16.2+dfsg-1
4.19.0+dfsg-1
4.19.1+dfsg-1
4.22.1+dfsg-1
4.22.1+dfsg1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ckeditor

Package

Name
ckeditor
Purl
pkg:deb/debian/ckeditor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ckeditor

Package

Name
ckeditor
Purl
pkg:deb/debian/ckeditor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/ckeditor/ckeditor-releases

Affected ranges

Type
GIT
Repo
https://github.com/ckeditor/ckeditor-releases
Events
Type
GIT
Repo
https://github.com/ckeditor/ckeditor4
Events
Type
GIT
Repo
https://github.com/drupal/drupal
Events

Affected versions

4.*

4.0
4.0.0
4.0.1
4.0.1.1
4.0.1/standard
4.0.2
4.0.3
4.0/standard
4.1
4.1.0
4.1.1
4.1.1/standard
4.1.2
4.1.2/standard
4.1.3
4.1.3/standard
4.1/standard
4.10.0
4.10.1
4.11.0
4.11.1
4.11.2
4.11.3
4.11.4
4.12.0
4.12.1
4.13.0
4.13.1
4.14.0
4.14.1
4.15.0
4.15.1
4.16.0
4.16.1
4.16.2
4.17.0
4.17.1
4.17.2
4.1rc
4.1rc/standard
4.2
4.2.0
4.2.1
4.2.1/standard
4.2.2
4.2.2/standard
4.2.3
4.2.3/standard
4.2/standard
4.3.0
4.3.0/standard
4.3.1
4.3.1/standard
4.3.2
4.3.2/standard
4.3.3
4.3.4
4.3.5
4.3beta
4.4.0
4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
4.4.6
4.4.7
4.4.8
4.5.0
4.5.0-beta
4.5.1
4.5.10
4.5.11
4.5.2
4.5.3
4.5.4
4.5.5
4.5.6
4.5.7
4.5.8
4.5.9
4.6.0
4.6.1
4.6.2
4.7.0
4.7.1
4.7.2
4.7.3
4.8.0
4.9.0
4.9.1
4.9.2

8.*

8.0.0
8.1.0-beta1

9.*

9.0.0-alpha1
9.0.0-alpha2
9.2.0
9.2.0-alpha1
9.2.0-beta1
9.2.0-beta2
9.2.0-beta3
9.2.0-rc1
9.2.1
9.2.10
9.2.11
9.2.12
9.2.13
9.2.14
9.2.2
9.2.3
9.2.4
9.2.5
9.2.6
9.2.7
9.2.8
9.2.9

standard/4.*

standard/4.10.0
standard/4.10.1
standard/4.11.0
standard/4.11.1
standard/4.11.2
standard/4.11.3
standard/4.11.4
standard/4.12.0
standard/4.12.1
standard/4.13.0
standard/4.13.1
standard/4.14.0
standard/4.14.1
standard/4.15.0
standard/4.15.1
standard/4.16.0
standard/4.16.1
standard/4.16.2
standard/4.17.0
standard/4.17.1
standard/4.17.2
standard/4.3.3
standard/4.3.4
standard/4.3.5
standard/4.4.0
standard/4.4.1
standard/4.4.2
standard/4.4.3
standard/4.4.4
standard/4.4.5
standard/4.4.6
standard/4.4.7
standard/4.4.8
standard/4.5.0
standard/4.5.1
standard/4.5.10
standard/4.5.11
standard/4.5.2
standard/4.5.3
standard/4.5.4
standard/4.5.5
standard/4.5.6
standard/4.5.7
standard/4.5.8
standard/4.5.9
standard/4.6.0
standard/4.6.1
standard/4.6.2
standard/4.7.0
standard/4.7.1
standard/4.7.2
standard/4.7.3
standard/4.8.0
standard/4.9.0
standard/4.9.1
standard/4.9.2