BigBlueButton is an open source web conferencing system. Users in meetings with private chat enabled are vulnerable to a cross site scripting attack in affected versions. The attack occurs when the attacker (with xss in the name) starts a chat. in the victim's client the JavaScript will be executed. This issue has been addressed in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/bigbluebutton/bigbluebutton/pull/15090 | third party advisory patch |
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-hwv2-5pf5-hr87 | third party advisory patch |
https://github.com/bigbluebutton/bigbluebutton/pull/15067 | release notes third party advisory patch |
https://pentests.nl/pentest-blog/stored-xss-in-bigbluebutton/ | third party advisory exploit |
http://seclists.org/fulldisclosure/2022/Jun/52 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html | exploit vdb entry third party advisory |