#hacking | XSS vulnerability in CKEditor prompts need for Drupal update
20 March 2020 at 14:20 UTC
Updated: 20 March 2020 at 14:29 UTC
Text editor flaw spawns CVE
A vulnerability in a third-party library component has had a knock-on effect on software packages that rely on it, including the Drupal content management system.
The issue involves a cross-site scripting (XSS) bug in CKEditor, a rich text editor that comes bundled with various online applications.
An attacker might be able to exploit the XSS vulnerability to target users with access to CKEditor. This potentially includes site admins with privileged access.
Exploitation is far from straightforward and would involve tricking potential victims into copying maliciously crafted HTML code before pasting it into CKEditor in ‘WYSIWYG’ mode.
“Although this is an unlikely scenario, we recommend upgrading to the latest editor version,” developers of CKEditor explain in an advisory, issued earlier this month.
CKEditor 4.14 fixes this XSS vulnerability in the HTML data processor, discovered by Michał Bentkowski of Securitum, as well as offering featuring improvements and resolution for an unrelated XSS vulnerability in the third-party WebSpellChecker Dialog plugin.
An advisory from Drupal, issued on Wednesday, instructs users to update to a version of the CMS that feature the updated version of CKEditor in order to mitigate the vulnerability.
In practice, this means upgrading to either Drupal 8.8.4 or Drupal 8.7.12.
The security flaw is described as “moderately critical” by Drupal, even though attackers would need to be able to create or edit content in order to attempt exploitation.
READ MORE WordPress Terror: Researchers discover a massive 5,000 security flaws in buggy plugins
The post #hacking | XSS vulnerability in CKEditor prompts need for Drupal update appeared first on National Cyber Security.
View full post on National Cyber Security