Drupal 9.2.x < 9.2.15 / 9.3.x < 9.3.8 Multiple Vulnerabilities (drupal-2022-03-16)

medium Nessus Plugin ID 158982

Synopsis

A PHP application running on the remote web server is affected by multiple vulnerabilities.

Description

According to its self-reported version, the instance of Drupal running on the remote web server is 9.2.x prior to 9.2.15 or 9.3.x prior to 9.3.8. It is, therefore, affected by multiple vulnerabilities.

- CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds. (CVE-2022-24729)

- CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0.
The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds. (CVE-2022-24728)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Drupal version 9.2.15 / 9.3.8 or later.

See Also

https://www.drupal.org/sa-core-2022-005

http://www.nessus.org/u?526d7751

https://github.com/ckeditor/ckeditor4

http://www.nessus.org/u?773fe8cd

http://www.nessus.org/u?742ef187

http://www.nessus.org/u?63de4ace

https://www.drupal.org/project/drupal/releases/9.2.15

https://www.drupal.org/project/drupal/releases/9.3.8

https://www.drupal.org/psa-2011-002

https://www.drupal.org/psa-2021-06-29

https://www.drupal.org/steward

Plugin Details

Severity: Medium

ID: 158982

File Name: drupal_9_3_8.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 3/16/2022

Updated: 11/6/2023

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.9

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2022-24728

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:drupal:drupal

Required KB Items: Settings/ParanoidReport, installed_sw/Drupal

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/16/2022

Vulnerability Publication Date: 3/16/2022

Reference Information

CVE: CVE-2022-24728, CVE-2022-24729

IAVA: 2022-A-0123-S