Skip to content

Blind SSRF When Uploading Presentation (mitigation bypass)

Moderate
antobinary published GHSA-h98v-2h8w-99c4 Oct 30, 2023

Package

No package listed

Affected versions

<2.6.12, <2.7.0-rc.1

Patched versions

2.6.12, 2.7.0-rc.1

Description

Impact

Server-Side Request Forgery (SSRF) is an attack where a malicious actor can abuse an application's functionality to read or modify internal resources. This is typically accomplished by supplying a URL to the server, which the server will then interact with. In an insertDocument API request an admin that knows the API Secret Salt is able to supply a URL from which the presentation should be downloaded. This URL was being used without having been successfully validated first.

Patches

Disabled follow redirect at httpclient.execute since we no longer have to follow it when using finalUrl.

BigBlueButton 2.6.12 patch: #18580
BigBlueButton 2.7.0-rc.1 patch: #18494

Workarounds

There are no workarounds. We recommend upgrading to a patched version of BigBlueButton.

References

This is a bypass of GHSA-3q22-hph2-cff7

Credit

devme4f from VNPT-VCI who contacted us via huntr.dev and responsibly disclosed this vulnerability.

Severity

Moderate
5.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVE ID

CVE-2023-43798

Weaknesses