Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump ckeditor4 from 4.18.0 to 4.25.0 in /mir-module #1048

Open
wants to merge 1 commit into
base: 2024.06.x
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 21, 2024

Bumps ckeditor4 from 4.18.0 to 4.25.0.

Changelog

Sourced from ckeditor4's changelog.

⚠️️️ CKEditor 4 (the open source edition) is no longer maintained. ⚠️

If you would like to keep access to future CKEditor 4 security patches, check the Extended Support Model, which guarantees security updates and critical bug fixes until December 2026. Alternatively, upgrade to CKEditor 5.

CKEditor 4.25.0-lts

⚠️️️ Please note that this release is a part of CKEditor 4 Extended Support Model, only available to customers who decided to acquire the LTS (Long Term Support) version of the editor. All editor versions below 4.25.0-lts can no longer be considered as secure! ⚠️

Security Updates:

  • Fixed reflected cross-site scripting (XSS) vulnerability in Code Snippet GeSHi plugin reported by Jiasheng He from Qihoo 360.

    Issue summary: The vulnerability allowed a reflected XSS attack by exploiting a flaw in the GeSHi syntax highlighter library hosted by the victim. The GeSHi library was included as a vendor dependency in CKEditor 4 source files. In a specific scenario, an attacker could craft a malicious script that could be executed by sending a request to the GeSHi library hosted on a PHP web server. See GHA for more details.

  • Fixed low-risk cross-site scripting (XSS) vulnerability linked to potential domain takeover

    Issue summery: A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. Although the vulnerability is purely hypothetical, we have addressed it in CKEditor 4.25.0-lts to ensure compliance with security best practices. See GHA for more details.

You can read more details in the relevant security advisories. Contact us if you have more questions.

An upgrade is highly recommended!

Updated dependencies:

  • CodeMirror (used only in the Toolbar Configurator in samples) has been updated to v5.65.17 for improved stability and performance.

  • Highlight.js (used by the Code Snippet plugin) has been updated to v11.9.0, introducing two breaking changes:

    • dropped support for Internet Explorer,
    • updated list of the supported themes – some of the themes are no longer officially supported, others may have their names changed (e.g. monokai_sublime is now monokai-sublime). Please verify the value of your config.codeSnippet_theme configuration option and adjust theme names as needed. The list of available themes can be checked in the plugins/codesnippet/lib/highlight/styles directory.

CKEditor 4.24.0-lts

⚠️️️ Please note that this release is a part of CKEditor 4 Extended Support Model, only available to customers who decided to acquire the LTS (Long Term Support) version of the editor. All editor versions below 4.24.0-lts can no longer be considered as secure! ⚠️

Security Updates:

  • Fixed cross-site scripting (XSS) vulnerability caused by incorrect CDATA detection reported by Michal Frýba, ALEF NULA.

    Issue summary: The vulnerability allowed to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. See GHA for more details.

  • Fixed cross-site scripting (XSS) vulnerability in AJAX sample reported by Rafael Pedrero, see INCIBE report.

    Issue summary: The vulnerability allowed to execute JavaScript code by abusing the AJAX sample. See GHA for more details.

  • Cross-site scripting (XSS) vulnerability in samples with enabled the preview feature reported by Marcin Wyczechowski & Michał Majchrowicz AFINE Team.

    Issue summary: The vulnerability allowed to execute JavaScript code by abusing the misconfigured preview feature. See GHA for more details.

You can read more details in the relevant security advisories. Contact us if you have more questions.

... (truncated)

Commits

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code labels Aug 21, 2024
@dependabot dependabot bot force-pushed the dependabot/npm_and_yarn/mir-module/ckeditor4-4.25.0 branch from a140071 to c9fe897 Compare August 27, 2024 13:03
Bumps [ckeditor4](https://github.com/ckeditor/ckeditor4-releases) from 4.18.0 to 4.25.0.
- [Changelog](https://github.com/ckeditor/ckeditor4-releases/blob/master/CHANGES.md)
- [Commits](https://github.com/ckeditor/ckeditor4-releases/commits)

---
updated-dependencies:
- dependency-name: ckeditor4
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot changed the base branch from 2023.06.x to 2024.06.x October 30, 2024 15:36
@dependabot dependabot bot force-pushed the dependabot/npm_and_yarn/mir-module/ckeditor4-4.25.0 branch from c9fe897 to db0a345 Compare October 30, 2024 15:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants