BigBlueButton is an open source web conferencing system. Users in meetings with private chat enabled are vulnerable to a cross site scripting attack in affected versions. The attack occurs when the attacker (with xss in the name) starts a chat. in the victim's client the JavaScript will be executed. This issue has been addressed in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2022/Jun/52 | Exploit Mailing List Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15067 | Patch Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/15090 | Patch Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-hwv2-5pf5-hr87 | Patch Third Party Advisory |
https://pentests.nl/pentest-blog/stored-xss-in-bigbluebutton/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-06-27T19:50:14
Updated: 2022-07-01T16:06:13
Reserved: 2022-05-18T00:00:00
Link: CVE-2022-31064
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-27T20:15:08.587
Modified: 2022-07-07T19:07:28.280
Link: CVE-2022-31064
JSON object: View
Redhat Information
No data.
CWE