First published: Wed Jun 01 2022(Updated: )
BigBlueButton is an open source web conferencing system. Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are vulnerable to regular expression denial of service (ReDoS) attacks. By using specific a RegularExpression, an attacker can cause denial of service for the bbb-html5 service. The useragent library performs checking of device by parsing the input of User-Agent header and lets it go through lookupUserAgent() (alias of useragent.lookup() ). This function handles input by regexing and attackers can abuse that by providing some ReDos payload using `SmartWatch`. The maintainers removed `htmlclient/useragent` from versions 2.3.19, 2.4.7, and 2.5.0-beta.2. As a workaround, disable NginX forwarding the requests to the handler according to the directions in the GitHub Security Advisory.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | >=2.2.0<2.3.19 | |
Bigbluebutton Bigbluebutton | >=2.4.0<2.4.7 | |
Bigbluebutton Bigbluebutton | =2.5-alpha1 | |
Bigbluebutton Bigbluebutton | =2.5-alpha2 | |
Bigbluebutton Bigbluebutton | =2.5-alpha3 | |
Bigbluebutton Bigbluebutton | =2.5-alpha4 | |
Bigbluebutton Bigbluebutton | =2.5-alpha5 | |
Bigbluebutton Bigbluebutton | =2.5-alpha6 | |
Bigbluebutton Bigbluebutton | =2.5-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29169 is a vulnerability in the BigBlueButton web conferencing system that allows for regular expression denial of service (ReDoS) attacks.
CVE-2022-29169 has a severity level of 7.5 (high).
Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are affected by CVE-2022-29169.
By using a specific Regular Expression, an attacker can perform denial of service attacks on the bbb-html5 server in BigBlueButton.
Yes, the fix for CVE-2022-29169 is available in the BigBlueButton repository. Please refer to the provided GitHub pull requests and security advisories for more information.