CVE-2023-42804
low-risk
Published 2023-10-30
BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
Do I need to act?
-
0.24% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (5)
Affected Vendors
References (4)
Third Party Advisory
https://github.com/bigbluebutton/bigbluebutton/pull/15960
Third Party Advisory
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229...
Third Party Advisory
https://github.com/bigbluebutton/bigbluebutton/pull/15960
Third Party Advisory
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229...
24
/ 100
low-risk
Severity
11/34 · Low
Exploitability
1/34 · Minimal
Exposure
12/34 · Low