Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/jitsi/jitsi-meet/pull/9320 | Patch Third Party Advisory |
https://hackerone.com/reports/1214493 | Permissions Required |
https://github.com/jitsi/jitsi-meet/pull/9404 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | Third Party Advisory |
Configurations
Information
Published : 2021-09-15 11:15
Updated : 2022-09-09 19:45
NVD link : CVE-2021-39205
Mitre link : CVE-2021-39205
JSON object : View
CWE
Products Affected
8x8
- jitsi_meet