CVE Vulnerabilities

CVE-2022-24729

Uncontrolled Resource Consumption

Published: Mar 16, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the dialog plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
CkeditorCkeditor4.0 (including)4.18.0 (excluding)
CkeditorUbuntubionic*
CkeditorUbuntuimpish*
CkeditorUbuntukinetic*
CkeditorUbuntulunar*
CkeditorUbuntumantic*
CkeditorUbuntutrusty*
CkeditorUbuntuupstream*
CkeditorUbuntuxenial*
Ckeditor3Ubuntubionic*
Ckeditor3Ubuntufocal*
Ckeditor3Ubuntuimpish*
Ckeditor3Ubuntukinetic*
Ckeditor3Ubuntulunar*
Ckeditor3Ubuntumantic*
Ckeditor3Ubuntuoracular*
Ckeditor3Ubuntuplucky*
Ckeditor3Ubuntutrusty*
Ckeditor3Ubuntuxenial*
Ldap-account-managerUbuntubionic*
Ldap-account-managerUbuntufocal*
Ldap-account-managerUbuntuimpish*
Ldap-account-managerUbuntukinetic*
Ldap-account-managerUbuntulunar*
Ldap-account-managerUbuntumantic*
Ldap-account-managerUbuntuoracular*
Ldap-account-managerUbuntuplucky*
Ldap-account-managerUbuntutrusty*
Ldap-account-managerUbuntuxenial*
Request-tracker4Ubuntubionic*
Request-tracker4Ubuntufocal*
Request-tracker4Ubuntuimpish*
Request-tracker4Ubuntukinetic*
Request-tracker4Ubuntulunar*
Request-tracker4Ubuntumantic*
Request-tracker4Ubuntuoracular*
Request-tracker4Ubuntuplucky*
Request-tracker4Ubuntutrusty*
Request-tracker4Ubuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References