CVE-2021-33506

7.5 HIGH

📋 TL;DR

CVE-2021-33506 is a configuration vulnerability in Jitsi Meet where the 'restrict_room_creation' setting is not enforced by default, allowing attackers to bypass conference moderation controls. This affects Jitsi Meet instances where room creation restrictions are intended but not properly configured. Organizations using Jitsi Meet for sensitive meetings are particularly at risk.

💻 Affected Systems

Products:
  • Jitsi Meet
Versions: All versions before 2.0.5963-1
Operating Systems: All platforms running Jitsi Meet
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using jitsi-meet-prosody component. The vulnerability exists in default configuration where restrict_room_creation is not properly enforced.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create unauthorized conference rooms, hijack existing meetings, or bypass moderation controls to disrupt sensitive discussions or expose confidential information.

🟠

Likely Case

Unauthorized users creating conference rooms that bypass organizational controls, potentially leading to meeting disruptions or unauthorized access to meeting infrastructure.

🟢

If Mitigated

With proper configuration, room creation is restricted to authorized users only, maintaining intended moderation controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of Jitsi Meet configuration but does not require advanced technical skills. Attackers need access to the Jitsi instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.5963-1 and later

Vendor Advisory: https://github.com/jitsi/security-advisories/blob/master/advisories/JSA-2021-0001.md

Restart Required: Yes

Instructions:

1. Update Jitsi Meet to version 2.0.5963-1 or later. 2. Update jitsi-meet-prosody package. 3. Restart Jitsi services. 4. Verify restrict_room_creation is properly configured in prosody config.

🔧 Temporary Workarounds

Manual Configuration Fix

linux

Manually configure restrict_room_creation setting in prosody configuration

Edit /etc/prosody/conf.avail/YOUR_DOMAIN.cfg.lua
Add or verify: 'restrict_room_creation' = true
Restart prosody: systemctl restart prosody

🧯 If You Can't Patch

  • Manually configure restrict_room_creation = true in all prosody configuration files
  • Implement network-level controls to restrict access to room creation endpoints

🔍 How to Verify

Check if Vulnerable:

Check Jitsi Meet version with: dpkg -l | grep jitsi-meet. If version is earlier than 2.0.5963-1, check prosody config for restrict_room_creation setting.

Check Version:

dpkg -l | grep jitsi-meet | awk '{print $3}'

Verify Fix Applied:

Verify version is 2.0.5963-1 or later and check that restrict_room_creation = true is present in prosody configuration files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized room creation attempts in prosody logs
  • Room creation events from unexpected users

Network Indicators:

  • HTTP POST requests to room creation endpoints from unauthorized sources

SIEM Query:

source="prosody" AND "room creation" AND NOT user IN (authorized_users_list)

🔗 References

📤 Share & Export