漏洞信息详情
CKEditor 跨站脚本漏洞
漏洞简介
CKEditor是一套开源的、基于网页的文字编辑器。
CKEditor 4.14之前的4.0版本中的HTML Data Processor存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://ckeditor.com/
参考网址
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/
来源:MISC
链接:https://github.com/ckeditor/ckeditor4
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042843
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/SAP-multiple-vulnerabilities-of-August-2020-33047
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuapr2021.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/CKEditor-Cross-Site-Scripting-via-HTML-Data-Processor-33637
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-9281
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-ckeditor-vulnerabilities-affect-ibm-control-center/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042618
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...