First published: Wed Jun 01 2022(Updated: )
BigBlueButton is an open source web conferencing system. In BigBlueButton starting with 2.2 but before 2.3.18 and 2.4-rc-1, an attacker can circumvent access controls to gain access to all breakout rooms of the meeting they are in. The permission checks rely on knowledge of internal ids rather than on verification of the role of the user. Versions 2.3.18 and 2.4-rc-1 contain a patch for this issue. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | >=2.2.0<2.3.18 | |
Bigbluebutton Bigbluebutton | =2.4-alpha1 | |
Bigbluebutton Bigbluebutton | =2.4-alpha2 | |
Bigbluebutton Bigbluebutton | =2.4-beta1 | |
Bigbluebutton Bigbluebutton | =2.4-beta2 | |
Bigbluebutton Bigbluebutton | =2.4-beta3 | |
Bigbluebutton Bigbluebutton | =2.4-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29233 is a vulnerability in the BigBlueButton web conferencing system that allows an attacker to bypass access controls and gain access to all breakout rooms of the meeting they are in.
CVE-2022-29233 has a severity level of 4.3, which is considered medium.
BigBlueButton versions 2.2 up to 2.3.18 and versions 2.4-alpha1 to 2.4-beta4 are affected by CVE-2022-29233.
An attacker can exploit CVE-2022-29233 by circumventing access controls and using internal ids to gain access to all breakout rooms of the meeting they are in.
Yes, patches and fixes for CVE-2022-29233 are available in the BigBlueButton releases tagged v2.3.18 and higher.