Unknown
CVE-2021-32808
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-32808
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
ckeditor is an open source WYSIWYG HTML editor with rich content support. A vulnerability has been discovered in the clipboard Widget plugin if used alongside the undo feature. The vulnerability allows a user to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0. The problem has been recognized and patched. The fix will be available in version 4.16.2.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- ckeditor,
- fedoraproject,
- oracle
Products
- application express,
- banking party management 2.7.0,
- ckeditor,
- commerce guided search 11.3.2,
- commerce merchandising 11.3.2,
- documaker 12.6.3,
- documaker 12.6.4,
- fedora 33,
- fedora 34,
- fedora 35,
- financial services analytical applications infrastructure,
- financial services model management and governance 8.0.8.0.0,
- financial services model management and governance 8.1.0.0.0,
- jd edwards enterpriseone tools,
- peoplesoft enterprise peopletools 8.57,
- peoplesoft enterprise peopletools 8.58,
- peoplesoft enterprise peopletools 8.59,
- siebel ui framework,
- webcenter sites 12.2.1.3.0,
- webcenter sites 12.2.1.4.0
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: