Vulnerability identifier: #VU48706
Vulnerability risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-862
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
BigBlueButton
Web applications /
Modules and components for CMS
Vendor: Blindside Networks
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to missing authorization in the "account_activations/edit?token=" URI. A remote attacker can create an approved user account associated with an email address that has an arbitrary domain name.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
BigBlueButton: 0.7 - 3.0.0 beta.4
External links
http://packetstormsecurity.com/files/160239/BigBlueButton-2.2.29-E-mail-Validation-Bypass.html
http://cxsecurity.com/issue/WLB-2020110211
http://github.com/bigbluebutton/bigbluebutton/releases
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.