-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0234
         Drupal core - Moderately critical - Cross Site Scripting
                   (SA-CORE-2022-001, SA-CORE-2022-002)
                              20 January 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Drupal core
Publisher:         Drupal
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-41183 CVE-2021-41182 CVE-2016-7103
                   CVE-2010-5312  

Reference:         ESB-2015.1212.2
                   ESB-2015.0520

Original Bulletin: 
   https://www.drupal.org/sa-core-2022-001
   https://www.drupal.org/sa-core-2022-002

Comment: This bulletin contains two (2) Drupal security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2022-001

Project:       Drupal core

Date:          2022-January-19

Security risk: Moderately critical 14/25
               AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default

Vulnerability: Cross Site Scripting

Description:
jQuery UI is a third-party library used by Drupal. This library was previously
thought to be end-of-life.

Late in 2021, jQuery UI announced that they would be continuing development,
and released a jQuery UI 1.13.0 version. As part of this 1.13.0 update, they
disclosed the following security issue that may affect Drupal 9 and 7:

  o CVE-2021-41183: XSS in the of option of the .position() util

It is possible that this vulnerability is exploitable with some Drupal modules.
As a precaution, this Drupal security release applies the fix for the above
cross-site description issue, without making any of the other changes to the
jQuery version that is included in Drupal.

This advisory is not covered by Drupal Steward .

Solution:

Install the latest version:

  o If you are using Drupal 9.3, update to Drupal 9.3.3 .
  o If you are using Drupal 9.2, update to Drupal 9.2.11 .
  o If you are using Drupal 7, update to Drupal 7.86 .

All versions of Drupal 8 and 9 prior to 9.2.x are end-of-life and do not
receive security coverage. Note that Drupal 8 has reached its end of life .

Reported By:

  o Lauri Eskola

Fixed By:

  o Lauri Eskola
  o Chris of the Drupal Security Team
  o Drew Webber of the Drupal Security Team
  o Alex Bronstein of the Drupal Security Team
  o Ben Mullins
  o xjm of the Drupal Security Team
  o Theodore Biadala


- ------------------------------------------------------------------------------


Drupal core - Moderately critical - Cross site scripting - SA-CORE-2022-002

Project:       Drupal core

Date:          2022-January-19

Security risk: Moderately critical 14/25
               AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default

Vulnerability: Cross site scripting

Description:
jQuery UI is a third-party library used by Drupal. This library was previously
thought to be end-of-life.

Late in 2021, jQuery UI announced that they would be continuing development,
and released a jQuery UI 1.13.0 version. In addition to the issue covered by
SA-CORE-20220-001 , further security vulnerabilities disclosed in jQuery UI
1.13.0 may affect Drupal 7 only:

  o CVE-2021-41182: XSS in the altField option of the Datepicker widget
  o CVE-2021-41183: XSS in *Text options of the Datepicker widget

Furthermore, other vulnerabilities listed below were previously unaddressed in
the version of jQuery UI included in Drupal 7 or in the jQuery Update module:

  o CVE-2016-7103: XSS in closeText option of Dialog
  o CVE-2010-5312: XSS in the title option of Dialog (applicable only to the
    jQuery UI version included in D7 core)

It is possible that these vulnerabilities are exploitable via contributed
Drupal modules or custom code. As a precaution, this Drupal security release
applies the fix for the above cross-site scripting issues, without making other
changes to the jQuery UI version that is included in Drupal.

This advisory is not covered by Drupal Steward .

Important note regarding the jQuery Update contrib module

These backport fixes in D7 have also been tested with the version of jQuery UI
provided by the most recent releases of the jQuery Update module (jQuery UI
1.10.2) and the fixes confirmed. Therefore, there is no accompanying security
release for jQuery Update.

However, in early 2022 the currently supported release of jQuery Update
(7.x-2.7 from 2015) will be deprecated and replaced by a new release from the
7.x-4.x branch. The stable release from that branch will then be the only
release considered by Drupal Security Team when new jQuery security issues
arise.

Please check the jQuery Update project page for more details, and for
announcements when the changes are made to supported releases.

Solution:

Install the latest version:

  o If you are using Drupal 7, update to Drupal 7.86

Reported By:

  o Lauri Eskola

Fixed By:

  o Drew Webber of the Drupal Security Team
  o Alex Bronstein of the Drupal Security Team
  o Lauri Eskola

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Z2l8
-----END PGP SIGNATURE-----