According to the Public Service Advisory PSA-2011-002 - External libraries and plugins Drupal Security team has released an advisory today with regard to an exploit found in the third party library.
The AltaGrade Blog
WordPress 5.2.3 is now available! This security and maintenance release features 29 fixes and enhancements. Plus, it adds a number of security fixes—see the list below.
These bugs affect WordPress versions 5.2.2 and earlier; version 5.2.3 fixes them, so you’ll want to upgrade.
If you haven’t yet updated to 5.2, there are also updated versions of 5.0 and earlier that fix the bugs for you.
Project: Imagecache External Date: 2019-August-21 Security risk: Critical 15∕25 Vulnerability: Insecure session token management
This module that allows you to store external images on your server and apply your own Image Styles.
The module exposes cookies to external sites when making external image requests.
This vulnerability is mitigated by using the whitelisted host feature to restrict external image requests from trusted sources.
Project: Super Login Date: 2019-August-14 Security risk: Moderately critical 13∕25 Vulnerability: Cross site scripting
This module improves the Drupal login page with the new features and layout.
The module doesn't sufficiently filter input text in the administration pages text configuration inputs. For example, the login text field.
The vulnerability is mitigated by the fact it can only be exploited by a user with the "Administer super login" permission.
Project: scroll to top Date: 2019-August-14 Security risk: Moderately critical 13∕25 Vulnerability: Cross site scripting
The Scroll To Top module enables you to have an animated scroll to top link in the bottom of the node.
The module does not sufficiently filter configuration text leading to a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer scroll to top".
Project: Forms Steps Date: 2019-August-14 Security risk: Critical 16∕25 Vulnerability: Access bypass
Forms Steps provides an UI to create form workflows using form modes. It creates quick and configurable multisteps forms.
The module doesn't sufficiently check user permissions to access its workflows entities that allows to see any entities that have been created through the different steps of its multistep forms.
Project: External Links Filter Date: 2019-August-14 Security risk: Moderately critical 10∕25 Vulnerability: Open Redirect Vulnerability
The External Link Filter module provides an input filter that replaces external links by a local link that redirects to the target URL.
The module did not have protection for the Redirect URL to go where content authors intended.
Install the latest version:
Drupal Security team announced today the discovery of vulnerabilities in Drupal 8 core and two Drupal 7 contributed modules - ImageCache Actions and Meta tags quick with the following details and recommended ways of mitigations.