BigBlueButton is an open source web conferencing system. Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are vulnerable to regular expression denial of service (ReDoS) attacks. By using specific a RegularExpression, an attacker can cause denial of service for the bbb-html5 service. The useragent library performs checking of device by parsing the input of User-Agent header and lets it go through lookupUserAgent() (alias of useragent.lookup() ). This function handles input by regexing and attackers can abuse that by providing some ReDos payload using `SmartWatch`. The maintainers removed `htmlclient/useragent` from versions 2.3.19, 2.4.7, and 2.5.0-beta.2. As a workaround, disable NginX forwarding the requests to the handler according to the directions in the GitHub Security Advisory.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/14886 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/14896 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rwrv-p665-4vwp | Mitigation Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-06-01T22:20:12
Updated: 2022-06-01T22:20:12
Reserved: 2022-04-13T00:00:00
Link: CVE-2022-29169
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-01T23:15:07.970
Modified: 2023-07-21T16:40:57.340
Link: CVE-2022-29169
JSON object: View
Redhat Information
No data.