cvelist/2022/26xxx/CVE-2022-26497.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2022-03-06 06:01:10 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-06-02 18:01:39 +00:00
"ID": "CVE-2022-26497",
"STATE": "PUBLIC"
2022-03-06 06:01:10 +00:00
},
2022-06-02 18:01:39 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-03-06 06:01:10 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-06-02 18:01:39 +00:00
"value": "BigBlueButton Greenlight 2.11.1 allows XSS. A threat actor could have a username containing a JavaScript payload. The payload gets executed in the browser of the victim in the \"Share room access\" dialog if the victim has shared access to the particular room with the attacker previously."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/bigbluebutton/greenlight/blob/master/app/assets/javascripts/room.js#L352",
"refsource": "MISC",
"name": "https://github.com/bigbluebutton/greenlight/blob/master/app/assets/javascripts/room.js#L352"
},
{
"refsource": "MISC",
"name": "https://www.mgm-sp.com/en/cve-2022-26497-bigbluebutton-greenlight-xss/",
"url": "https://www.mgm-sp.com/en/cve-2022-26497-bigbluebutton-greenlight-xss/"
2022-03-06 06:01:10 +00:00
}
]
}
}