{"id":"CVE-2022-29169","summary":"ReDoS on endpoint html5client/useragent in BigBlueButton","details":"BigBlueButton is an open source web conferencing system. Versions starting with 2.2 and prior to 2.3.19, 2.4.7, and 2.5.0-beta.2 are vulnerable to regular expression denial of service (ReDoS) attacks. By using specific a RegularExpression, an attacker can cause denial of service for the bbb-html5 service. The useragent library performs checking of device by parsing the input of User-Agent header and lets it go through lookupUserAgent() (alias of useragent.lookup() ). This function handles input by regexing and attackers can abuse that by providing some ReDos payload using `SmartWatch`. The maintainers removed `htmlclient/useragent` from versions 2.3.19, 2.4.7, and 2.5.0-beta.2. As a workaround, disable NginX forwarding the requests to the handler according to the directions in the GitHub Security Advisory.","aliases":["GHSA-rwrv-p665-4vwp"],"modified":"2026-04-10T04:47:09.194250Z","published":"2022-06-01T22:20:12Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29169.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-20"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29169.json"},{"type":"ADVISORY","url":"https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rwrv-p665-4vwp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29169"},{"type":"FIX","url":"https://github.com/bigbluebutton/bigbluebutton/pull/14886"},{"type":"FIX","url":"https://github.com/bigbluebutton/bigbluebutton/pull/14896"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bigbluebutton/bigbluebutton","events":[{"introduced":"68e35c9d722e62892d2e885646a9eab3bf44f77d"},{"fixed":"e9df2db16f902a453a250819dffd8029f9ca956d"}],"database_specific":{"versions":[{"introduced":"2.2"},{"fixed":"2.3.19"}]}},{"type":"GIT","repo":"https://github.com/bigbluebutton/bigbluebutton","events":[{"introduced":"72d5e54e3eb3cd442d23dc097158fe81f1efda82"},{"fixed":"eda21682ea3fd472c8d16fe7ec6bcf0f80370a6f"}],"database_specific":{"versions":[{"introduced":"2.4.0"},{"fixed":"2.4.7"}]}},{"type":"GIT","repo":"https://github.com/bigbluebutton/bigbluebutton","events":[{"introduced":"60302d3e353cea201fbd02912302d7f040f0dc27"},{"fixed":"a2ef36723ac49176002cb96f16a205f0f11743c9"}],"database_specific":{"versions":[{"introduced":"2.5-alpha-1"},{"fixed":"2.5.0-beta.2"}]}}],"versions":["v2.4.0","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.5-alpha-1","v2.5-alpha-2","v2.5-alpha-3","v2.5-alpha-4","v2.5.0-alpha.5","v2.5.0-alpha.6","v2.5.0-beta.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29169.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}