Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1813 Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2021-003 27 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal core Publisher: Drupal Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade Original Bulletin: https://www.drupal.org/sa-core-2021-003 - --------------------------BEGIN INCLUDED TEXT-------------------- Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2021-003 Project: Drupal core Date: 2021-May-26 Security risk: Moderately critical 14/25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default Vulnerability: Cross Site Scripting Description: Drupal core uses the third-party CKEditor library. This library has an error in parsing HTML that could lead to an XSS attack. Solution: Install the latest version: o If you are using Drupal 9.1, update to Drupal 9.1.9 . o If you are using Drupal 9.0, update to Drupal 9.0.14 . o If you are using Drupal 8.9, update to Drupal 8.9.16 . Versions of Drupal 8 prior to 8.9.x are end-of-life and do not receive security coverage. Reported By: o Or Sahar Fixed By: o Greg Knaddison of the Drupal Security Team o Jess of the Drupal Security Team o Krzysztof Krzton o Lee Rowlands of the Drupal Security Team o Michael Hess of the Drupal Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYK7+u+NLKJtyKPYoAQjLyA/8C8X8Y0W4CmaPHQTbNTTYQwoAQUcEVuYf knkC6DJ/ATxIz0EwH4xjoJjc6ErC8uE5X/0rw/CVyjrQ1SQy7aHbeDKXKBaVAnoN 9rGgNjoPd+q46fAcXaDXeQWcD2U79MLJ56HtdGHq+XM92+Q0C144NEPPOjZ80PED RuoEHIe3t6j1YJFkaKRIVie2ig8Fyq4/5+em8Y5nJkmhdKBsaaADqrRjcIKucdGz hhdn1hhGflejtnw+QS2smHoKWpTGIFmXxiy3I72+kY/QgM79rCJHAamTCpy2/peE Ro5MFmWyX8nMOW1xsoXPiMGD85JUMGW7UlG9gk2SglGnHk28FB1CsogVnfl290V9 wLUmj4KqRT1Iq02PcrggohS79NV2vjbMGe+Sg+lGrDCMI3hI37sQhNKIoUyHL1PZ d4NumT2Swsh9qmM6iPkMnWlj6OASlWguowawh/FvHkUtglOo5fGwod0XpHu2um0M tp52xb+bOitHTQSn3hMEHGxE6N0jShtCswCgWZhBz6Teu3+LlaaL165hWRBDphpx 3/QYfPr/dj7WTv5d5K0mEuRUs7E2HWvZHuffih9RusIr+WPkf3bF2MZugu4nZSfR J5DvHnEEU3p0H0QDwmjz8sIynx1pF6lmBCQqbqzGk8FsY2mbin3hnRl+R2eV1JBP iScx9u7ooB0= =GGvL -----END PGP SIGNATURE-----