Path Traversal – Reading Certain File Extensions in bigbluebutton/bigbluebutton
Reported on
Oct 26th 2022
BigBlueButton 2.5.6 is vulnerable to a path traversal vulnerability, that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png).
- PoC:
1- Submit a request to /bigbluebutton/presentation/<conference>/<room>/<presentation name>/textfiles/<id>
2- A valid path needs to be present on the server to traverse from.
3- utilize a double encoded forward slash "/" to traverse (%252f)
Check the below screenshot for more details.
https://drive.google.com/file/d/1UayYuoU4wVud1DUa3jY7B2G63_sOkNKy/view?usp=sharing
- Fix: Do input validation on the parameters being passed and strip dangerous characters.
Impact
Reading files with certain extensions that the client has no access to by default.
Thanks for this submission. We're working on adding more validation.
Hey! Thanks for your report, we've assigned a developer to fix it.
@bigbluebutton Hi team, I'd appreciate it if you could release a CVE on that from your end through Github.
Hi @anndalotaibi,
I have requested a CVE from GitHub via https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-3qjg-229m-vq84
It typically takes up to a day. I will keep you posted.