BigBlueButton is an open source web conferencing system. Versions prior to 2.4.3, are subject to Insufficient Verification of Data Authenticity, resulting in Denial of Service. An attacker can make a Meteor call to `validateAuthToken` using a victim's userId, meetingId, and an invalid authToken. This forces the victim to leave the conference, because the resulting verification failure is also observed and handled by the victim's client. The attacker must be a participant in any meeting on the server. This issue is patched in version 2.4.3. There are no workarounds.
References
Link | Resource |
---|---|
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.3 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rgjp-3r74-g4cm | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.3 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1 | Release Notes Third Party Advisory |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rgjp-3r74-g4cm | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.3 - Release Notes, Third Party Advisory | |
References | () https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1 - Release Notes, Third Party Advisory | |
References | () https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rgjp-3r74-g4cm - Release Notes, Third Party Advisory |
Information
Published : 2022-12-16 00:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41960
Mitre link : CVE-2022-41960
CVE.ORG link : CVE-2022-41960
JSON object : View
Products Affected
bigbluebutton
- bigbluebutton
CWE
CWE-345
Insufficient Verification of Data Authenticity