BigBlueButton is an open source web conferencing system. In affected versions an attacker can embed malicious JS in their username and have it executed on the victim's client. When a user receives a private chat from the attacker (whose username contains malicious JavaScript), the script gets executed. Additionally when the victim receives a notification that the attacker has left the session. This issue has been patched in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-8m2p-7qv3-qff7 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15087 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15090 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-27 13:15
Updated : 2022-07-07 12:17
NVD link : CVE-2022-31065
Mitre link : CVE-2022-31065
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
bigbluebutton
- bigbluebutton