{"vulnerability": "CVE-2022-23490", "sightings": [{"uuid": "a4382e20-f604-45e2-9621-5d90784c2a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23490", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12243", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-23490\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: BigBlueButton is an open source web conferencing system. Versions prior to 2.4.0 expose sensitive information to Unauthorized Actors. This issue affects meetings with polls, where the attacker is a meeting participant. Subscribing to the current-poll collection does not update the client UI, but does give the attacker access to the contents of the collection, which include the individual poll responses. This issue is patched in version 2.4.0. There are no workarounds.\n\n\ud83d\udccf Published: 2022-12-16T21:02:30.109Z\n\ud83d\udccf Modified: 2025-04-17T14:34:58.102Z\n\ud83d\udd17 References:\n1. https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-4qgc-xhw5-6qfg\n2. https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.0", "creation_timestamp": "2025-04-17T14:58:26.000000Z"}, {"uuid": "c4fbd8ad-4d16-4256-bfd4-40acb4da16b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23490", "type": "seen", "source": "https://t.me/cibsecurity/54792", "content": "\u203c CVE-2022-23490 \u203c\n\nBigBlueButton is an open source web conferencing system. Versions prior to 2.4.0 expose sensitive information to Unauthorized Actors. This issue affects meetings with polls, where the attacker is a meeting participant. Subscribing to the current-poll collection does not update the client UI, but does give the attacker access to the contents of the collection, which include the individual poll responses. This issue is patched in version 2.4.0. There are no workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-17T00:24:43.000000Z"}]}