<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-django-ckeditor</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:0008-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-07T17:02:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-07T17:02:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-07T17:02:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-django-ckeditor</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-django-ckeditor fixes the following issues:

- Update to 6.7.2
  * Deprecated the package.
  * Added a new ckeditor/fixups.js script which disables the version check again 
    (if something slips through by accident) and which disables the behavior 
    where CKEditor 4 would automatically attach itself to unrelated HTML elements 
    with a contenteditable attribute (see CKEDITOR.disableAutoInline in the 
    CKEditor 4 docs).
- CVE-2024-24815: Fixed bypass of Advanced Content Filtering mechanism (boo#1219720)

- update to 6.7.1:
  * Add Python 3.12, Django 5.0
  * Silence the CKEditor version check/nag but include a system check warning

- update to 6.7.0:
  * Dark mode fixes.
  * Added support for Pillow 10.

- update to 6.6.1:
  * Required a newer version of django-js-asset which actually works
    with Django 4.1.
  * CKEditor 4.21.0
  * Fixed the CKEditor styles when used with the dark Django admin theme.

- update to 6.5.1:
  * Avoided calling ``static()`` if ``CKEDITOR_BASEPATH`` is defined.
  * Fixed ``./manage.py generateckeditorthumbnails`` to work again after the
    image uploader backend rework.
  * CKEditor 4.19.1
  * Stopped calling ``static()`` during application startup.
  * Added Django 4.1
  * Changed the context for the widget to deviate less from Django. Removed a
  * few template variables which are not used in the bundled
  * ``ckeditor/widget.html`` template. This only affects you if you are using a
  * customized widget or widget template.
  * Dropped support for Python &lt; 3.8, Django &lt; 3.2.
  * Added a pre-commit configuration.
  * Added a GitHub action for running tests.
  * Made selenium tests require opt in using a ``SELENIUM=firefox`` or
    ``SELENIUM=chromium`` environment variable.
  * Made it possible to override the CKEditor template in the widget class.
  * Changed ``CKEDITOR_IMAGE_BACKEND`` to require dotted module paths (the old
    identifiers are still supported for now).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2025-8</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNT2JPQVYWDQRDN2YJ7KJCRBY5QEJQW/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:0008-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219720</URL>
      <Description>SUSE Bug 1219720</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-24815/</URL>
      <Description>SUSE CVE CVE-2024-24815 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Package Hub 15 SP5">SUSE Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python311-django-ckeditor-6.7.2-bp155.3.3.1">
      <FullProductName ProductID="python311-django-ckeditor-6.7.2-bp155.3.3.1">python311-django-ckeditor-6.7.2-bp155.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python311-django-ckeditor-6.7.2-bp155.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:python311-django-ckeditor-6.7.2-bp155.3.3.1">python311-django-ckeditor-6.7.2-bp155.3.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-django-ckeditor-6.7.2-bp155.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python311-django-ckeditor-6.7.2-bp155.3.3.1">python311-django-ckeditor-6.7.2-bp155.3.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered in the core HTML parsing module in versions of CKEditor4 prior to 4.24.0-lts. It may affect all editor instances that enabled full-page editing mode or enabled CDATA elements in Advanced Content Filtering configuration (defaults to `script` and `style` elements). The vulnerability allows attackers to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. An attacker could abuse faulty CDATA content detection and use it to prepare an intentional attack on the editor. A fix is available in version 4.24.0-lts.</Note>
    </Notes>
    <CVE>CVE-2024-24815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:python311-django-ckeditor-6.7.2-bp155.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python311-django-ckeditor-6.7.2-bp155.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNT2JPQVYWDQRDN2YJ7KJCRBY5QEJQW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-24815.html</URL>
        <Description>CVE-2024-24815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219720</URL>
        <Description>SUSE Bug 1219720</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
