BigBlueButton is an open source web conferencing system. Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are vulnerable to regular expression denial of service (ReDoS) attacks. By using specific a RegularExpression, an attacker can cause denial of service for the bbb-html5 service. The useragent library performs checking of device by parsing the input of User-Agent header and lets it go through lookupUserAgent() (alias of useragent.lookup() ). This function handles input by regexing and attackers can abuse that by providing some ReDos payload using `SmartWatch`. The maintainers removed `htmlclient/useragent` from versions 2.3.19, 2.4.7, and 2.5.0-beta.2. As a workaround, disable NginX forwarding the requests to the handler according to the directions in the GitHub Security Advisory.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/14896 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rwrv-p665-4vwp | Mitigation Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/14886 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-01 16:15
Updated : 2022-06-09 05:57
NVD link : CVE-2022-29169
Mitre link : CVE-2022-29169
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
bigbluebutton
- bigbluebutton