Description
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker may be able to exploit the overly elevated file permissions in the `/usr/local/bigbluebutton/core/vendor/bundle/ruby/2.7.0/gems/resque-2.6.0` directory with the goal of privilege escalation, potentially exposing sensitive information on the server. This issue has been patched in version(s) 2.6.18, 2.7.8 and 3.0.0-alpha.7.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-5966-9hw8-q96q
Patch x_refsource_misc
https://github.com/bigbluebutton/bigbluebutton/commit/04e916798b6b1f53f88513df3168f009b57b8f18
Scores
CVSS v3
3.7
EPSS
0.0014
EPSS Percentile
34.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-269
Status
published
Products (3)
bigbluebutton/bigbluebutton
< 2.6.18
bigbluebutton/bigbluebutton
>= 2.7.0, < 2.7.8
bigbluebutton/bigbluebutton
>= 2.8.0, < 3.0.0-alpha.7
Published
Jun 28, 2024
Tracked Since
Feb 18, 2026