Apache OpenMeetings has eliminated critical level vulnerabilities that allowed unauthorized access to arbitrary records and communication rooms. The vulnerabilities were identified as CVE-2023-28936, CVE-2023-29032 and CVE-2023-29246. The root cause of the vulnerabilities was discovered to be an incorrect check of the hash used to connect new participants. The error was detected from the release of 2.0.0 and remained unaddressed until Apache OpenMeetings released a fix in their latest update, version 7.1.0.
Both CVE-2023-29032 and CVE-2023-29246 are severe in nature and can bypass authentication by impersonating another user and perform codes on the server respectively if an attacker managed to gain access to the admin account of the OpenMeetings. The elimination of these vulnerabilities was a result of Apache OpenMeetings’ commitment to providing secure web conferences with its updates.
Users of Apache OpenMeetings are strongly advised to update to version 7.1.0 to eliminate any potential attacks caused by the vulnerabilities. The complete vulnerability details can be found on the Apache Security Mailing List [1].
References:
– [1] https://wwww.openwall.com/lists/oss-security/2023/05/12/1
– [2] https://issues.apache.org/jira/browse/openmeetings-2762
– [3] https://nvd.nist.gov/vuln/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail/detail28936
– [4] https://www.openwall.com/lists/oss-security/2023/05/12/2
– [5] https://issues.apache.org/jira/browse/openmeetings-2765
– [6] https://www.openwall.com/lists/oss-security/2023/05/12/3
– [7] https://issues.apache.org/browse/openmeetings-2764