Description
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
Remediation
References
https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser
https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/
https://www.drupal.org/sa-core-2021-003
Related Vulnerabilities
CVE-2021-3644 Vulnerability in maven package org.wildfly.core:wildfly-controller
CVE-2009-2901 Vulnerability in maven package tomcat:catalina
CVE-2018-1000160 Vulnerability in npm package @risingstack/protect
CVE-2020-7647 Vulnerability in maven package org.jooby:jooby
CVE-2022-34804 Vulnerability in maven package org.jenkins-ci.plugins:opsgenie