First published: Wed Jun 01 2022(Updated: )
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4-rc-6, an attacker who is able to obtain the meeting identifier for a meeting on a server can find information related to an external video being shared, like the current timestamp and play/pause. The problem has been patched in versions 2.3.18 and 2.4-rc-6 by modifying the stream to send the data only for users in the meeting. There are currently no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | >=2.2.0<2.3.18 | |
Bigbluebutton Bigbluebutton | =2.4-alpha1 | |
Bigbluebutton Bigbluebutton | =2.4-alpha2 | |
Bigbluebutton Bigbluebutton | =2.4-beta1 | |
Bigbluebutton Bigbluebutton | =2.4-beta2 | |
Bigbluebutton Bigbluebutton | =2.4-beta3 | |
Bigbluebutton Bigbluebutton | =2.4-beta4 | |
Bigbluebutton Bigbluebutton | =2.4-rc1 | |
Bigbluebutton Bigbluebutton | =2.4-rc3 | |
Bigbluebutton Bigbluebutton | =2.4-rc4 | |
Bigbluebutton Bigbluebutton | =2.4-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29235 is a vulnerability in the BigBlueButton web conferencing system that allows an attacker with the meeting identifier to obtain information about an external video being shared.
The severity of CVE-2022-29235 is medium with a score of 5.3.
BigBlueButton versions 2.2 up to versions 2.3.18 and 2.4-rc-6 are affected by CVE-2022-29235.
An attacker can exploit CVE-2022-29235 by obtaining the meeting identifier for a meeting on a server and using it to find information about an external video being shared.
Yes, a fix for CVE-2022-29235 is available in BigBlueButton version 2.3.18 and can be downloaded from the official BigBlueButton website.