BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are vulnerable to Insertion of Sensitive Information Into Sent Data. The moderators-only webcams lock setting is not enforced on the backend, which allows an attacker to subscribe to viewers webcams, even when the lock setting is applied. (The required streamId was being sent to all users even with lock setting applied). This issue is fixed in version 2.4-rc-6. There are no workarounds.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bigbluebutton | Bigbluebutton | * | 2.4 (excluding) |
Bigbluebutton | Bigbluebutton | 2.4-alpha1 (including) | 2.4-alpha1 (including) |
Bigbluebutton | Bigbluebutton | 2.4-alpha2 (including) | 2.4-alpha2 (including) |
Bigbluebutton | Bigbluebutton | 2.4-beta1 (including) | 2.4-beta1 (including) |
Bigbluebutton | Bigbluebutton | 2.4-beta2 (including) | 2.4-beta2 (including) |
Bigbluebutton | Bigbluebutton | 2.4-beta3 (including) | 2.4-beta3 (including) |
Bigbluebutton | Bigbluebutton | 2.4-beta4 (including) | 2.4-beta4 (including) |
Bigbluebutton | Bigbluebutton | 2.4-rc1 (including) | 2.4-rc1 (including) |
Bigbluebutton | Bigbluebutton | 2.4-rc2 (including) | 2.4-rc2 (including) |
Bigbluebutton | Bigbluebutton | 2.4-rc3 (including) | 2.4-rc3 (including) |
Bigbluebutton | Bigbluebutton | 2.4-rc4 (including) | 2.4-rc4 (including) |
Bigbluebutton | Bigbluebutton | 2.4-rc5 (including) | 2.4-rc5 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are incorrectly applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.