Vulnerability Description
BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bigbluebutton | Bigbluebutton | <= 2.5.18 |
Related Weaknesses (CWE)
References
- https://github.com/bigbluebutton/bigbluebutton/pull/15960Third Party Advisory
- https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229Third Party Advisory
- https://github.com/bigbluebutton/bigbluebutton/pull/15960Third Party Advisory
- https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229Third Party Advisory
FAQ
What is CVE-2023-42804?
CVE-2023-42804 is a vulnerability with a CVSS score of 3.1 (LOW). BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse...
How severe is CVE-2023-42804?
CVE-2023-42804 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-42804?
Check the references section above for vendor advisories and patch information. Affected products include: Bigbluebutton Bigbluebutton.