jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
https://github.com/jitsi/jitsi-meet-electron/commit/ca1eb702507fdc4400fe21c905a9f85702f92a14 | third party advisory patch |
https://github.com/jitsi/jitsi-meet-electron/releases/tag/v2.3.0 | third party advisory release notes |
https://security.stackexchange.com/questions/225799 | third party advisory exploit |