CVE-2022-31065
27.06.2022, 20:15
BigBlueButton is an open source web conferencing system. In affected versions an attacker can embed malicious JS in their username and have it executed on the victim's client. When a user receives a private chat from the attacker (whose username contains malicious JavaScript), the script gets executed. Additionally when the victim receives a notification that the attacker has left the session. This issue has been patched in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
Vendor | Product | Version |
---|---|---|
bigbluebutton | bigbluebutton | 2.4 ≤ 𝑥 < 2.4.8 |
bigbluebutton | bigbluebutton | 2.3.0 |
bigbluebutton | bigbluebutton | 2.4.9 |
bigbluebutton | bigbluebutton | 2.5:alpha1 |
bigbluebutton | bigbluebutton | 2.5:alpha2 |
bigbluebutton | bigbluebutton | 2.5:alpha3 |
bigbluebutton | bigbluebutton | 2.5:alpha4 |
bigbluebutton | bigbluebutton | 2.5:alpha5 |
bigbluebutton | bigbluebutton | 2.5:alpha6 |
bigbluebutton | bigbluebutton | 2.5:beta1 |
bigbluebutton | bigbluebutton | 2.5:beta2 |
bigbluebutton | bigbluebutton | 2.5:rc.1 |
bigbluebutton | bigbluebutton | 2.5:rc.2 |
bigbluebutton | bigbluebutton | 2.5:rc.3 |
bigbluebutton | bigbluebutton | 2.5:rc.4 |
𝑥
= Vulnerable software versions
References