BigBlueButton is an open source web conferencing system. Users in meetings with private chat enabled are vulnerable to a cross site scripting attack in affected versions. The attack occurs when the attacker (with xss in the name) starts a chat. in the victim's client the JavaScript will be executed. This issue has been addressed in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://pentests.nl/pentest-blog/stored-xss-in-bigbluebutton/ | Exploit Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-hwv2-5pf5-hr87 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15067 | Patch Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15090 | Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2022/Jun/52 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-27 13:15
Updated : 2022-07-07 12:07
NVD link : CVE-2022-31064
Mitre link : CVE-2022-31064
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
bigbluebutton
- bigbluebutton