First published: Wed Jun 01 2022(Updated: )
BigBlueButton is an open source web conferencing system. Starting with version 2.2 and prior to versions 2.3.9 and 2.4-beta-1, an attacker can circumvent access controls to obtain the content of public chat messages from different meetings on the server. The attacker must be a participant in a meeting on the server. BigBlueButton versions 2.3.9 and 2.4-beta-1 contain a patch for this issue. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | >=2.2.0<2.3.9 | |
Bigbluebutton Bigbluebutton | =2.4-alpha1 | |
Bigbluebutton Bigbluebutton | =2.4-alpha2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29232 is a vulnerability in BigBlueButton, an open source web conferencing system, that allows an attacker to obtain the content of public chat messages from different meetings on the server.
Versions 2.2 to 2.3.9 and versions 2.4-alpha1 to 2.4-alpha2 of BigBlueButton are affected by CVE-2022-29232.
An attacker can exploit CVE-2022-29232 by circumventing access controls to access the content of public chat messages from different meetings on the server.
CVE-2022-29232 has a severity rating of medium with a CVSS score of 6.5.
To fix CVE-2022-29232, you should upgrade your BigBlueButton installation to version 2.3.9 or apply the necessary patches provided by the BigBlueButton project.