Vulnerability Details : CVE-2021-33506
jitsi-meet-prosody in Jitsi Meet before 2.0.5963-1 does not ensure that restrict_room_creation is set by default. This can allow an attacker to circumvent conference moderation.
Products affected by CVE-2021-33506
- cpe:2.3:a:8x8:jitsi_meet:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33506
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33506
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2021-33506
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33506
-
https://github.com/jitsi/jitsi-meet/pull/9252/files
Updates prosody config for main muc component. by damencho · Pull Request #9252 · jitsi/jitsi-meet · GitHubPatch;Third Party Advisory
-
https://github.com/jitsi/security-advisories/blob/master/advisories/JSA-2021-0001.md
security-advisories/JSA-2021-0001.md at master · jitsi/security-advisories · GitHubThird Party Advisory
-
https://github.com/jitsi/jitsi-meet/compare/5025...5026
Comparing 5025...5026 · jitsi/jitsi-meet · GitHubPatch;Third Party Advisory
Jump to