Skip to content

Path Traversal – Reading Certain File Extensions

Low
antobinary published GHSA-3qjg-229m-vq84 Oct 30, 2023

Package

No package listed

Affected versions

< 2.6.0

Patched versions

2.6.0

Description

Impact

BigBlueButton 2.5 is vulnerable to a path traversal vulnerability, that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png).

Patches

Input validation was added on the parameters being passed and dangerous characters are stripped.

Patch on BigBlueButton 2.6.0-beta.1: #15960

Workarounds

There are no workarounds. We recommend upgrading to a patched version of BigBlueButton.

References

Credits

Abdulmohsen Alotaibi who contacted us via huntr.dev and responsibly disclosed this vulnerability.

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE ID

CVE-2023-42804

Weaknesses

No CWEs