{"id":"USN-5340-2","summary":"ckeditor vulnerabilities","details":"USN-5340-1 fixed several vulnerabilities in CKEditor.\nThis update provides the fixes for CVE-2018-9861, CVE-2020-9281,\nCVE-2021-32809, CVE-2021-33829 and CVE-2021-37695 for Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\nKyaw Min Thein discovered that CKEditor incorrectly handled\ncertain inputs. An attacker could possibly use this issue\nto execute arbitrary code. This issue only affects\nUbuntu 18.04 LTS. (CVE-2018-9861)\n\nMicha Bentkowski discovered that CKEditor incorrectly handled\ncertain inputs. An attacker could possibly use this issue to\nexecute arbitrary code. This issue only affects\nUbuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-9281)\n\nAnton Subbotin discovered that CKEditor incorrectly handled\ncertain inputs. An attacker could possibly use this issue to\nexecute arbitrary code. This issue only affects\nUbuntu 21.10. (CVE-2021-32808)\n\nAnton Subbotin discovered that CKEditor incorrectly handled\ncertain inputs. An attacker could possibly use this issue to\ninject arbitrary code. (CVE-2021-32809)\n\nOr Sahar discovered that CKEditor incorrectly handled certain\ninputs. An attacker could possibly use this issue to execute\narbitrary code. This issue only affects\nUbuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-33829)\n\nMika Kulmala discovered that CKEditor incorrectly handled\ncertain inputs. An attacker could possibly use this issue to\nexecute arbitrary code. (CVE-2021-37695)\n","modified":"2026-02-10T04:42:32Z","published":"2022-03-23T08:57:25Z","related":["UBUNTU-CVE-2018-9861","UBUNTU-CVE-2020-9281","UBUNTU-CVE-2021-32809","UBUNTU-CVE-2021-33829","UBUNTU-CVE-2021-37695"],"upstream":["CVE-2018-9861","CVE-2020-9281","CVE-2021-32809","CVE-2021-33829","CVE-2021-37695","UBUNTU-CVE-2018-9861","UBUNTU-CVE-2020-9281","UBUNTU-CVE-2021-32809","UBUNTU-CVE-2021-33829","UBUNTU-CVE-2021-37695"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5340-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-9861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-9281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-32809"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33829"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-37695"}],"affected":[{"package":{"name":"ckeditor","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ckeditor@4.5.7+dfsg-2ubuntu0.16.04.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.5.7+dfsg-2ubuntu0.16.04.1~esm1"}]}],"versions":["4.4.4+dfsg1-3","4.5.6+dfsg-1","4.5.7+dfsg-1","4.5.7+dfsg-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"ckeditor","binary_version":"4.5.7+dfsg-2ubuntu0.16.04.1~esm1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2018-9861","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-9281","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-32809","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-33829","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-37695","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5340-2.json"}}],"schema_version":"1.7.3"}