BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-47231 BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-05T20:23:14.540Z

Reserved: 2023-09-14T16:13:33.306Z

Link: CVE-2023-42804

cve-icon Vulnrichment

Updated: 2024-08-02T19:30:24.724Z

cve-icon NVD

Status : Modified

Published: 2023-10-30T19:15:08.037

Modified: 2024-11-21T08:23:11.483

Link: CVE-2023-42804

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.