-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1237
                     Drupal core - Moderately critical
                               20 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Drupal core
Publisher:         FreeBSD
Operating System:  FreeBSD
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade

Reference:         ESB-2018.1232

Original Bulletin: 
   http://www.vuxml.org/freebsd/33174280-43fa-11e8-aad5-6cf0497db129.html
   https://www.drupal.org/sa-core-2018-003

- --------------------------BEGIN INCLUDED TEXT--------------------

drupal -- Drupal core - Moderately critical

Affected packages
  drupal8 < 8.5.2

Details

VuXML ID  33174280-43fa-11e8-aad5-6cf0497db129
Discovery 2018-04-18
Entry     2018-04-19

The Drupal security team reports:

    CKEditor, a third-party JavaScript library included in Drupal core, has
    fixed a cross-site scripting (XSS) vulnerability. The vulnerability stemmed
    from the fact that it was possible to execute XSS inside CKEditor when
    using the image2 plugin (which Drupal 8 core also uses).

References

URL https://www.drupal.org/sa-core-2018-003

- -------------------------------------------------------------------------------

Copyright (C) 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright information.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWtmMmIx+lLeg9Ub1AQjCNBAAjzForvn8OfWk5vK5oB9Z7RdoM6p2fYLm
GnlrjPW37h9anz67HZmEbfDbXIyBKrk3qu4suouI7M63ke2Q4/YJ+2Yc89Gc1uvU
tPZBSdFYA2/I0OLkHjHCoNl2fo7Nx4t70clh5CzzlDCrmNiD+gAv+qfXxktZYqe9
zNlKbfOYSzKOm0ooGfhs2Opf8eqWxlUstxdOhejqdsaV+K9vrYx4hqcglOrPGleV
btSxaPUF0+YIxh0PJxsjkGsIYBoLVsqyVJzpFEJosLa1m7jRzNSaka0eIuxds2mb
ZCZwSTFd3zXuPcjJgzjgdCUjE02wpnajEn0UXcVVH8Fhf8WY8QLVnLD7y21fOqtL
fY4Rqwd7D+AA6XTnOwPCvkMynMRzoKCwrFhylpfaNw97UiJDa9MXazfeMbpbaOMq
7wIJyUcefz0xJE9k64GPmKXleFgma9KldljOJF/5l8qfoYfedcpu1NeqreLQeiSN
7K1rUnOzPGKZB/95AY+QBa0m5b1KB3rSv2qLSscnhVo7l762a31CQaOVDpAJU7Gg
BJwMtmZNkKiulhmXlta4+KWdmw3nTpPpCjOuspvFgfpw4aA17vvvV0k9M1uYGxFc
DDigPHTfp/vAwlmfX+XPHuNOTZwEjoKvshlkRI25ShfyNY6ycIUt8u8XR8FFKTwG
JbCvfxIJKPQ=
=9IGV
-----END PGP SIGNATURE-----