Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/jitsi/jitsi-meet/pull/9320 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/pull/9404 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | Third Party Advisory |
https://hackerone.com/reports/1214493 | Permissions Required |
https://github.com/jitsi/jitsi-meet/pull/9320 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/pull/9404 | Patch Third Party Advisory |
https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg | Third Party Advisory |
https://hackerone.com/reports/1214493 | Permissions Required |
Configurations
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.8 |
References | () https://github.com/jitsi/jitsi-meet/pull/9320 - Patch, Third Party Advisory | |
References | () https://github.com/jitsi/jitsi-meet/pull/9404 - Patch, Third Party Advisory | |
References | () https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg - Third Party Advisory | |
References | () https://hackerone.com/reports/1214493 - Permissions Required |
Information
Published : 2021-09-15 18:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-39205
Mitre link : CVE-2021-39205
CVE.ORG link : CVE-2021-39205
JSON object : View
Products Affected
8x8
- jitsi_meet