BigBlueButton is an open source web conferencing system. Starting with version 2.2 and prior to versions 2.3.9 and 2.4-beta-1, an attacker can circumvent access controls to obtain the content of public chat messages from different meetings on the server. The attacker must be a participant in a meeting on the server. BigBlueButton versions 2.3.9 and 2.4-beta-1 contain a patch for this issue. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3fqh-p4qr-vfm9 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4-beta-1 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/12861 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.3.9 | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-01 16:15
Updated : 2022-06-09 07:45
NVD link : CVE-2022-29232
Mitre link : CVE-2022-29232
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
bigbluebutton
- bigbluebutton