View online: https://www.drupal.org/sa-core-2019-004
Project: Drupal core [1] Date: 2019-March-20 Security risk: *Moderately critical* 13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Cross Site Scripting
Description: Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.
Solution: * If you are using Drupal 8.6, update to Drupal 8.6.13 [3]. * If you are using Drupal 8.5 or earlier, update to Drupal 8.5.14 [4]. * If you are using Drupal 7, update to Drupal 7.65 [5].
Versions of Drupal 8 prior to 8.5.x are end-of-life and do not receive security coverage.
Reported By: * Zero Day Initiative [6]
Fixed By: * Alex Pott [7] of the Drupal Security Team * Lee Rowlands [8] of the Drupal Security Team * Greg Knaddison [9] of the Drupal Security Team * Neil Drumm [10] of the Drupal Security Team * Michael Hess [11] of the Drupal Security Team * David Rothstein [12] of the Drupal Security Team * Peter Wolanin [13] of the Drupal Security Team
[1] https://www.drupal.org/project/drupal [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/drupal/releases/8.6.13 [4] https://www.drupal.org/project/drupal/releases/8.5.14 [5] https://www.drupal.org/project/drupal/releases/7.65 [6] https://www.drupal.org/user/3594938 [7] https://www.drupal.org/user/157725 [8] https://www.drupal.org/user/395439 [9] https://www.drupal.org/user/36762 [10] https://www.drupal.org/user/3064 [11] https://www.drupal.org/user/102818 [12] https://www.drupal.org/user/124982 [13] https://www.drupal.org/user/49851