First published: Thu Jun 02 2022(Updated: )
BigBlueButton Greenlight 2.11.1 allows XSS. A threat actor could have a username containing a JavaScript payload. The payload gets executed in the browser of the victim in the "Share room access" dialog if the victim has shared access to the particular room with the attacker previously.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BigBlueButton Greenlight | =2.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26497 is a vulnerability in BigBlueButton Greenlight 2.11.1 that allows XSS (Cross-Site Scripting).
CVE-2022-26497 allows a threat actor to have a username containing a JavaScript payload, which gets executed in the browser of the victim in the 'Share room access' dialog if the victim has shared access to the particular room with the attacker previously.
CVE-2022-26497 has a severity rating of medium with a CVSS score of 5.4.
To fix CVE-2022-26497, it is recommended to upgrade to a patched version of BigBlueButton Greenlight beyond 2.11.1.
Yes, you can find more information about CVE-2022-26497 at the following references: http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html, https://github.com/bigbluebutton/greenlight/blob/master/app/assets/javascripts/room.js#L352, https://www.mgm-sp.com/en/cve-2022-26497-bigbluebutton-greenlight-xss/