First published: Mon Oct 30 2023(Updated: )
BigBlueButton is an open-source virtual classroom. BigBlueButton prior to versions 2.6.12 and 2.7.0-rc.1 is vulnerable to Server-Side Request Forgery (SSRF). This issue is a bypass of CVE-2023-33176. A patch in versions 2.6.12 and 2.7.0-rc.1 disabled follow redirect at `httpclient.execute` since the software no longer has to follow it when using `finalUrl`. There are no known workarounds. We recommend upgrading to a patched version of BigBlueButton.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | <2.6.12 | |
Bigbluebutton Bigbluebutton | =2.7.0-alpha1 | |
Bigbluebutton Bigbluebutton | =2.7.0-alpha2 | |
Bigbluebutton Bigbluebutton | =2.7.0-alpha3 | |
Bigbluebutton Bigbluebutton | =2.7.0-beta1 | |
Bigbluebutton Bigbluebutton | =2.7.0-beta2 | |
Bigbluebutton Bigbluebutton | =2.7.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43798 is a vulnerability in BigBlueButton that allows for Server-Side Request Forgery (SSRF) when uploading a presentation.
The severity of CVE-2023-43798 is medium with a CVSS score of 5.6.
CVE-2023-43798 affects BigBlueButton versions prior to 2.6.12 and 2.7.0-rc.1.
Yes, a patch is available in BigBlueButton versions 2.6.12 and 2.7.0-rc.1.
To mitigate CVE-2023-43798, make sure to update your BigBlueButton installation to versions 2.6.12 or 2.7.0-rc.1.