CVE-2021-39205

Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
Configurations

Configuration 1 (hide)

cpe:2.3:a:8x8:jitsi_meet:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 6.8
References () https://github.com/jitsi/jitsi-meet/pull/9320 - Patch, Third Party Advisory () https://github.com/jitsi/jitsi-meet/pull/9320 - Patch, Third Party Advisory
References () https://github.com/jitsi/jitsi-meet/pull/9404 - Patch, Third Party Advisory () https://github.com/jitsi/jitsi-meet/pull/9404 - Patch, Third Party Advisory
References () https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg - Third Party Advisory () https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg - Third Party Advisory
References () https://hackerone.com/reports/1214493 - Permissions Required () https://hackerone.com/reports/1214493 - Permissions Required

Information

Published : 2021-09-15 18:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39205

Mitre link : CVE-2021-39205

CVE.ORG link : CVE-2021-39205


JSON object : View

Products Affected

8x8

  • jitsi_meet
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')