BigBlueButton before 2.2.6 allows remote attackers to read arbitrary files because the presfilename (lowercase) value can be a .pdf filename while the presFilename (mixed case) value has a ../ sequence. This can be leveraged for privilege escalation via a directory traversal to bigbluebutton.properties. NOTE: this issue exists because of an ineffective mitigation to CVE-2020-12112 in which there was an attempted fix within an NGINX configuration file, without considering that the relevant part of NGINX is case-insensitive.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/9259/commits/b21ca8355a57286a1e6df96984b3a4c57679a463 | Patch Third Party Advisory |
https://github.com/mclab-hbrs/BBB-POC | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-04-28 19:15
Updated : 2020-05-06 07:02
NVD link : CVE-2020-12443
Mitre link : CVE-2020-12443
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
bigbluebutton
- bigbluebutton