CVE-2022-29169
01.06.2022, 23:15
BigBlueButton is an open source web conferencing system. Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are vulnerable to regular expression denial of service (ReDoS) attacks. By using specific a RegularExpression, an attacker can cause denial of service for the bbb-html5 service. The useragent library performs checking of device by parsing the input of User-Agent header and lets it go through lookupUserAgent() (alias of useragent.lookup() ). This function handles input by regexing and attackers can abuse that by providing some ReDos payload using `SmartWatch`. The maintainers removed `htmlclient/useragent` from versions 2.3.19, 2.4.7, and 2.5.0-beta.2. As a workaround, disable NginX forwarding the requests to the handler according to the directions in the GitHub Security Advisory.Enginsight
Vendor | Product | Version |
---|---|---|
bigbluebutton | bigbluebutton | 2.2.0 ≤ 𝑥 < 2.3.19 |
bigbluebutton | bigbluebutton | 2.4.0 ≤ 𝑥 < 2.4.7 |
bigbluebutton | bigbluebutton | 2.5:alpha1 |
bigbluebutton | bigbluebutton | 2.5:alpha2 |
bigbluebutton | bigbluebutton | 2.5:alpha3 |
bigbluebutton | bigbluebutton | 2.5:alpha4 |
bigbluebutton | bigbluebutton | 2.5:alpha5 |
bigbluebutton | bigbluebutton | 2.5:alpha6 |
bigbluebutton | bigbluebutton | 2.5:beta1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-1333 - Inefficient Regular Expression ComplexityThe product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
References