First published: Fri Jun 28 2024(Updated: )
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker with a valid join link to a meeting can trick BigBlueButton into generating a signed join link with additional parameters. One of those parameters may be "role=moderator", allowing an attacker to join a meeting as moderator using a join link that was originally created for viewer access. This vulnerability has been patched in version(s) 2.6.18, 2.7.8 and 3.0.0-alpha.7.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
BigBlueButton | <2.6.18<2.7.8<3.0.0-alpha.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38518 is a high severity vulnerability that allows an attacker to generate a signed join link with unauthorized parameters.
To fix CVE-2024-38518, users should update BigBlueButton to a version that is not affected, specifically beyond 2.6.18, 2.7.8, and 3.0.0-alpha.7.
Users of BigBlueButton versions up to 2.6.18, 2.7.8, and 3.0.0-alpha.7 are at risk from CVE-2024-38518.
CVE-2024-38518 can be exploited by an attacker to impersonate a moderator within a meeting by generating a manipulated join link.
The impacts of CVE-2024-38518 include potential unauthorized access to moderator privileges, which can lead to disruption of meetings and misuse of features.