BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/15960 | Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229m-vq84 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-10-30 19:15
Updated : 2023-11-07 23:17
NVD link : CVE-2023-42804
Mitre link : CVE-2023-42804
CVE.ORG link : CVE-2023-42804
JSON object : View
Products Affected
bigbluebutton
- bigbluebutton
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')