BigBlueButton Greenlight before 2.5.6 allows HTTP header (Host and Origin) attacks, which can result in Account Takeover if a victim follows a spoofed password-reset link.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/greenlight/pull/1543 | Patch Third Party Advisory |
https://github.com/bigbluebutton/greenlight/releases/tag/release-2.5.6 | Third Party Advisory |
https://www.sakshamanand.com/host-header-injection-bigbluebutton/ | Exploit Third Party Advisory |
https://github.com/bigbluebutton/greenlight/pull/1543 | Patch Third Party Advisory |
https://github.com/bigbluebutton/greenlight/releases/tag/release-2.5.6 | Third Party Advisory |
https://www.sakshamanand.com/host-header-injection-bigbluebutton/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bigbluebutton/greenlight/pull/1543 - Patch, Third Party Advisory | |
References | () https://github.com/bigbluebutton/greenlight/releases/tag/release-2.5.6 - Third Party Advisory | |
References | () https://www.sakshamanand.com/host-header-injection-bigbluebutton/ - Exploit, Third Party Advisory |
Information
Published : 2020-09-30 18:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26163
Mitre link : CVE-2020-26163
CVE.ORG link : CVE-2020-26163
JSON object : View
Products Affected
bigbluebutton
- greenlight
CWE