Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/jitsi/jitsi-meet/pull/9320 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/pull/9404 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | Third Party Advisory |
https://hackerone.com/reports/1214493 | Permissions Required |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-09-15T17:15:12
Updated: 2021-09-15T17:15:12
Reserved: 2021-08-16T00:00:00
Link: CVE-2021-39205
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-15T18:15:09.187
Modified: 2022-09-10T02:45:50.647
Link: CVE-2021-39205
JSON object: View
Redhat Information
No data.