BigBlueButton is an open-source virtual classroom. BigBlueButton prior to versions 2.6.12 and 2.7.0-rc.1 is vulnerable to Server-Side Request Forgery (SSRF). This issue is a bypass of CVE-2023-33176. A patch in versions 2.6.12 and 2.7.0-rc.1 disabled follow redirect at `httpclient.execute` since the software no longer has to follow it when using `finalUrl`. There are no known workarounds. We recommend upgrading to a patched version of BigBlueButton.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/18494 | Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/pull/18580 | Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3q22-hph2-cff7 | Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-h98v-2h8w-99c4 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-30T22:24:59.109Z
Updated: 2023-10-30T22:24:59.109Z
Reserved: 2023-09-22T14:51:42.340Z
Link: CVE-2023-43798
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-30T23:15:08.397
Modified: 2023-11-08T20:12:42.660
Link: CVE-2023-43798
JSON object: View
Redhat Information
No data.
CWE