First published: Mon Oct 30 2023(Updated: )
BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | <=2.5.18 | |
Bigbluebutton Bigbluebutton | =2.6.0-alpha1 | |
Bigbluebutton Bigbluebutton | =2.6.0-alpha2 | |
Bigbluebutton Bigbluebutton | =2.6.0-alpha3 | |
Bigbluebutton Bigbluebutton | =2.6.0-alpha4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42804 is a path traversal vulnerability in BigBlueButton that allows an attacker to read certain files without authentication.
The severity of CVE-2023-42804 is medium, with a CVSS score of 5.3.
CVE-2023-42804 affects BigBlueButton versions up to and including 2.5.18, 2.6.0-alpha1, 2.6.0-alpha2, 2.6.0-alpha3, and 2.6.0-alpha4.
An attacker with a valid starting folder path can traverse and read other files with certain extensions (txt, swf, etc.) without authentication.
Yes, upgrading to BigBlueButton version 2.6.0-beta.1 or later will fix the CVE-2023-42804 vulnerability.