BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4.1, an attacker could send messages to a locked chat within a grace period of 5s after the lock setting was enacted. The attacker needs to be a participant in the meeting. Versions 2.3.18 and 2.4.1 contain a patch for this issue. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/13850 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.1 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/14265 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.3.18 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-36vc-c338-6xjv | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-01 17:15
Updated : 2022-06-09 08:06
NVD link : CVE-2022-29234
Mitre link : CVE-2022-29234
JSON object : View
CWE
CWE-285
Improper Authorization
Products Affected
bigbluebutton
- bigbluebutton