[PROD](renovate) Update dependency ckeditor/ckeditor to v4.24.0 [SECURITY] #575
+6
−6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.20.1
->4.24.0
GitHub Vulnerability Alerts
CVE-2024-24815
Affected packages
The vulnerability has been discovered in the core HTML parsing module and may affect all editor instances that:
script
andstyle
elements).Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. An attacker could abuse faulty CDATA content detection and use it to prepare an intentional attack on the editor. It affects all users using the CKEditor 4 at version < 4.24.0-lts.
Patches
The problem has been recognized and patched. The fix will be available in version 4.24.0-lts.
For more information
Email us at [email protected] if you have any questions or comments about this advisory.
Acknowledgements
The CKEditor 4 team would like to thank Michal Frýba from ALEF NULA for recognizing and reporting this vulnerability.
Release Notes
ckeditor/ckeditor4-releases (ckeditor/ckeditor)
v4.24.0
Compare Source
Security Updates:
Fixed cross-site scripting (XSS) vulnerability caused by incorrect CDATA detection reported by Michal Frýba, ALEF NULA.
Issue summary: The vulnerability allowed to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. See GHA for more details.
Fixed cross-site scripting (XSS) vulnerability in AJAX sample reported by Rafael Pedrero, see INCIBE report.
Issue summary: The vulnerability allowed to execute JavaScript code by abusing the AJAX sample. See GHA for more details.
Cross-site scripting (XSS) vulnerability in samples with enabled the preview feature reported by Marcin Wyczechowski & Michał Majchrowicz, AFINE Team.
Issue summary: The vulnerability allowed to execute JavaScript code by abusing the misconfigured preview feature. See GHA for more details.
You can read more details in the relevant security advisories. Contact us if you have more questions.
An upgrade is highly recommended!
Fixed Issues:
v4.23.0
Compare Source
This release introduces the LTS (”Long Term Support”) version of the editor, available under commercial terms ("Extended Support Model").
If you acquired the Extended Support Model for CKEditor 4 LTS, please read the CKEditor 4 LTS key activation guide.
v4.22.1
Compare Source
New Features:
config.styleSet
configuration option.config.versionCheck
configuration option to learn more.Fixed Issues:
Other Changes:
document.domain
in Firefox in the Preview plugin.Note: CKEditor 4.22.1 has been released immediately after 4.22.0 to fix the README issues on npm and contains no changes vs 4.22.0.
v4.22.0
Compare Source
New Features:
config.styleSet
configuration option.config.versionCheck
configuration option to learn more.Fixed Issues:
Other Changes:
document.domain
in Firefox in the Preview plugin.Note: CKEditor 4.22.1 has been released immediately after 4.22.0 to fix the README issues on npm and contains no changes vs 4.22.0.
v4.21.0
Compare Source
Security Updates:
A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed plugins.
This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. See GitHub advisory for more details.
Potential breaking changes
In some rare cases, a security release may introduce a breaking change to your application. We have provided configuration options that will help you mitigate any potential issues with the upgrade:
sandbox
attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure theconfig.iframe_attributes
option.config.embed_keepOriginalContent
option.If you choose to change either of the above options, make sure to properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on your web page.
You can read more details in the relevant security advisory and contact us if you have more questions.
An upgrade is highly recommended!
New Features:
config.uploadImage_supportedTypes
configuration option allowing to change the image formats accepted by the Upload Image plugin. Thanks to SilverYoCha!Fixed Issues:
v4.20.2
Compare Source
Fixed Issues:
popstate
andhashchange
events on thewindow
, added by the Maximize plugin, were not removed when destroying the editor instance.change
event upon finishing upload, resulting in passing incorrect data in form controls for integration frameworks, like Reactive forms in Angular.API changes:
colorButton_contentsCss
configuration option allowing to add custom CSS to the Color Button menu content. Thanks to mihilion!Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Warsaw, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.