{"vulnerability": "CVE-2022-23488", "sightings": [{"uuid": "d1780c22-11a6-425a-8b70-48ec19a34003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23488", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12247", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-23488\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are vulnerable to Insertion of Sensitive Information Into Sent Data. The moderators-only webcams lock setting is not enforced on the backend, which allows an attacker to subscribe to viewers' webcams, even when the lock setting is applied. (The required streamId was being sent to all users even with lock setting applied). This issue is fixed in version 2.4-rc-6.  There are no workarounds.\n\ud83d\udccf Published: 2022-12-17T00:28:46.567Z\n\ud83d\udccf Modified: 2025-04-17T14:33:18.205Z\n\ud83d\udd17 References:\n1. https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-j5g3-f74q-rvfq\n2. https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4-rc-6", "creation_timestamp": "2025-04-17T14:58:33.000000Z"}]}