Skip to content

Latest commit

 

History

History
31 lines (23 loc) · 1.46 KB

JSA-2020-0001.md

File metadata and controls

31 lines (23 loc) · 1.46 KB

Overview

  • Project: jitsi-meet-electron
  • Summary: Multiple Remote Code Execution issues
  • Severity: High
  • Affected versions: All < 2.3.0
  • Fixed date: 2020-07-01
  • Fixed version: 2.3.0
  • CVE: N/A
  • Reported by: Juho Nurminen (Mattermost)

Description

Multiple issues that could yield to Remote Code Execution (RCE) have been found:

  • RCE via UNC paths: an atacker with a modified Jitsi Meet server could use the exposed shellOpenExternal function to open a custom binary in the user's path.
  • RCE via lack of consent in remote control: an attacker could run a modified Jitsi Meet server to trigger a user into enabling remote control and thus execute remote commands.
  • RCE via prototype pollution: an attacker with a modified Jitsi Meet server could use prototype pollution to bypass checks in shellOpenExternal and thus result in RCE.

Resolution


Jitsi security advisories are posted in https://github.com/jitsi/security-advisories/tree/master/advisories