[Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-005
security-news at drupal.org
security-news at drupal.org
Wed Mar 16 16:32:12 UTC 2022
View online: https://www.drupal.org/sa-core-2022-005
Project: Drupal core [1]
Date: 2022-March-16
Security risk: *Moderately critical* 13∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Third-party libraries
CVE IDs: CVE-2022-24728CVE-2022-24729
Description:
The Drupal project uses the CKEditor [3] library for WYSIWYG editing.
CKEditor has released a security update that impacts Drupal [4].
Vulnerabilities are possible if Drupal is configured to allow use of the
CKEditor library for WYSIWYG editing. An attacker that can create or edit
content (even without access to CKEditor themselves) may be able to exploit
one or more Cross-Site Scripting (XSS) vulnerabilities to target users with
access to the WYSIWYG CKEditor, including site admins with privileged access.
For more information, see CKEditor's security advisories:
* CVE-2022-24728: HTML processing vulnerability allowing to execute
JavaScript code [5]
* CVE-2022-24729: Regular expression Denial of Service in dialog plugin [6]
This advisory is not covered by Drupal Steward [7].
Solution:
Install the latest version:
* If you are using Drupal 9.3, update to Drupal 9.3.8 [8].
* If you are using Drupal 9.2, update to Drupal 9.2.15 [9].
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive
security coverage. Note that Drupal 8 has reached its end of life [10].
.... Instructions for Drupal 7 and contributed modules
Drupal 7 core is not affected, although Drupal 7, 8, and 9 site owners should
review their site following the protocol for managing external libraries and
plugins [11] previously suggested by the Drupal Security Team, as contributed
projects may use additional CKEditor plugins not packaged in Drupal core.
Users of the Webform module should ensure Webform's version of CKEditor 4 is
also up-to-date after updating Drupal core and libraries for any affected
contributed modules. If it is not, Webform users can try the following steps
to update it:
1) If using Composer, run drush webform:libraries:composer >
DRUPAL_ROOT/composer.libraries.json and run composer update
2) If using Drush without Composer, run drush webform:libraries:update.
Learn more about updating Webform libraries. [12]
Reported By:
* Jacek Bogdański [13]
Fixed By:
* Jess [14] of the Drupal Security Team
* Wim Leers [15]
* Lee Rowlands [16] of the Drupal Security Team
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://github.com/ckeditor/ckeditor4
[4]
https://ckeditor.com/blog/ckeditor-4.18.0-browser-bugfix-and-security-patches/
[5]
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89
[6]
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-f6rf-9m92-x2hh
[7] https://www.drupal.org/steward
[8] https://www.drupal.org/project/drupal/releases/9.3.8
[9] https://www.drupal.org/project/drupal/releases/9.2.15
[10] https://www.drupal.org/psa-2021-06-29
[11] https://www.drupal.org/psa-2011-002
[12]
https://www.drupal.org/docs/contributed-modules/webform/webform-libraries
[13] https://www.drupal.org/user/3683355
[14] https://www.drupal.org/user/65776
[15] https://www.drupal.org/user/99777
[16] https://www.drupal.org/user/395439
More information about the Security-news
mailing list