Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.0234 Drupal core - Moderately critical - Cross Site Scripting (SA-CORE-2022-001, SA-CORE-2022-002) 20 January 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal core Publisher: Drupal Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-41183 CVE-2021-41182 CVE-2016-7103 CVE-2010-5312 Reference: ESB-2015.1212.2 ESB-2015.0520 Original Bulletin: https://www.drupal.org/sa-core-2022-001 https://www.drupal.org/sa-core-2022-002 Comment: This bulletin contains two (2) Drupal security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2022-001 Project: Drupal core Date: 2022-January-19 Security risk: Moderately critical 14/25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default Vulnerability: Cross Site Scripting Description: jQuery UI is a third-party library used by Drupal. This library was previously thought to be end-of-life. Late in 2021, jQuery UI announced that they would be continuing development, and released a jQuery UI 1.13.0 version. As part of this 1.13.0 update, they disclosed the following security issue that may affect Drupal 9 and 7: o CVE-2021-41183: XSS in the of option of the .position() util It is possible that this vulnerability is exploitable with some Drupal modules. As a precaution, this Drupal security release applies the fix for the above cross-site description issue, without making any of the other changes to the jQuery version that is included in Drupal. This advisory is not covered by Drupal Steward . Solution: Install the latest version: o If you are using Drupal 9.3, update to Drupal 9.3.3 . o If you are using Drupal 9.2, update to Drupal 9.2.11 . o If you are using Drupal 7, update to Drupal 7.86 . All versions of Drupal 8 and 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life . Reported By: o Lauri Eskola Fixed By: o Lauri Eskola o Chris of the Drupal Security Team o Drew Webber of the Drupal Security Team o Alex Bronstein of the Drupal Security Team o Ben Mullins o xjm of the Drupal Security Team o Theodore Biadala - ------------------------------------------------------------------------------ Drupal core - Moderately critical - Cross site scripting - SA-CORE-2022-002 Project: Drupal core Date: 2022-January-19 Security risk: Moderately critical 14/25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default Vulnerability: Cross site scripting Description: jQuery UI is a third-party library used by Drupal. This library was previously thought to be end-of-life. Late in 2021, jQuery UI announced that they would be continuing development, and released a jQuery UI 1.13.0 version. In addition to the issue covered by SA-CORE-20220-001 , further security vulnerabilities disclosed in jQuery UI 1.13.0 may affect Drupal 7 only: o CVE-2021-41182: XSS in the altField option of the Datepicker widget o CVE-2021-41183: XSS in *Text options of the Datepicker widget Furthermore, other vulnerabilities listed below were previously unaddressed in the version of jQuery UI included in Drupal 7 or in the jQuery Update module: o CVE-2016-7103: XSS in closeText option of Dialog o CVE-2010-5312: XSS in the title option of Dialog (applicable only to the jQuery UI version included in D7 core) It is possible that these vulnerabilities are exploitable via contributed Drupal modules or custom code. As a precaution, this Drupal security release applies the fix for the above cross-site scripting issues, without making other changes to the jQuery UI version that is included in Drupal. This advisory is not covered by Drupal Steward . Important note regarding the jQuery Update contrib module These backport fixes in D7 have also been tested with the version of jQuery UI provided by the most recent releases of the jQuery Update module (jQuery UI 1.10.2) and the fixes confirmed. Therefore, there is no accompanying security release for jQuery Update. However, in early 2022 the currently supported release of jQuery Update (7.x-2.7 from 2015) will be deprecated and replaced by a new release from the 7.x-4.x branch. The stable release from that branch will then be the only release considered by Drupal Security Team when new jQuery security issues arise. Please check the jQuery Update project page for more details, and for announcements when the changes are made to supported releases. Solution: Install the latest version: o If you are using Drupal 7, update to Drupal 7.86 Reported By: o Lauri Eskola Fixed By: o Drew Webber of the Drupal Security Team o Alex Bronstein of the Drupal Security Team o Lauri Eskola - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYeioguNLKJtyKPYoAQghAQ/9GGNoyDllMpRWxMYuxnEzz/kLGyHDZeQR QEmw0slQ9RTi6tj9z6Zz1vnFEgiKHCvtFZJInfI3QWvVdEzyejlfMV+K1huwoAS5 tE0h//VtmAYIFI+FE+tZj5MFWfabn/P07N/LubgpBlKynoc0Ioa9dAzmBKnLQunG pJS5E54HKl3UBxNksiGkbo2EBQ6qQZBWVrnHFwIznxDGm+ICq8DvA1CwWkTYvEBW tg2GmMCw0wAHEQnXkOLBZg9YlnZHXCZt27NjwNltDI9pGJPlj0oAwn3wBLxn2Zrs +2DKMX+qtcAt/fw3TejBVrURdGWHw6HD+iUsv5t30bDpuIktNKAaGLXldtcmnmfj l5G/QIML9U829YdRRfhRaCmSNTa4oVtwKIJYSF/Q45ozYrf1sjiS/+gl8JAw+bS4 tgQHLP7vOEYJUnZPe4SgntZypBRuUWhFKP4mm3dxwNCWH5V+heIQ/0+wX2+PnhK1 xokKOUwfXdXcijlfX+CW1O/uVda0KHbq6Ftwes98xiZ9hAyl/42ywpyNQR3XAU53 wDS8pyOZeBxJREDKWzpYD9JUrMw32uUSX67dMGKIoyHFDUODRMC7FLsqdBbiudKn +DjnxFAKFnzfyz897J8hGSh+Yh9wdil0gVkKf9zTb3N205bcCALA/RvbP6kzIWs3 gGZCSbXgPUE= =Z2l8 -----END PGP SIGNATURE-----