Vulnerabilities (CVE)

Filtered by vendor Bigbluebutton Subscribe
Total 47 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-27602 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 N/A 9.8 CRITICAL
BigBlueButton before 2.2.7 does not have a protection mechanism for separator injection in meetingId, userId, and authToken.
CVE-2020-27601 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 N/A 3.5 LOW
In BigBlueButton before 2.2.7, lockSettingsProps.disablePrivateChat does not apply to already opened chats. This occurs in bigbluebutton-html5/imports/ui/components/chat/service.js.
CVE-2020-26163 1 Bigbluebutton 1 Greenlight 2024-11-21 6.8 MEDIUM 8.8 HIGH
BigBlueButton Greenlight before 2.5.6 allows HTTP header (Host and Origin) attacks, which can result in Account Takeover if a victim follows a spoofed password-reset link.
CVE-2020-25820 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field.
CVE-2020-12443 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 7.5 HIGH 9.8 CRITICAL
BigBlueButton before 2.2.6 allows remote attackers to read arbitrary files because the presfilename (lowercase) value can be a .pdf filename while the presFilename (mixed case) value has a ../ sequence. This can be leveraged for privilege escalation via a directory traversal to bigbluebutton.properties. NOTE: this issue exists because of an ineffective mitigation to CVE-2020-12112 in which there was an attempted fix within an NGINX configuration file, without considering that the relevant part of NGINX is case-insensitive.
CVE-2020-12113 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
BigBlueButton before 2.2.4 allows XSS via closed captions because dangerouslySetInnerHTML in React is used.
CVE-2020-12112 1 Bigbluebutton 1 Bigbluebutton 2024-11-21 5.0 MEDIUM 7.5 HIGH
BigBlueButton before 2.2.5 allows remote attackers to obtain sensitive files via Local File Inclusion.