CVE-2022-36028
📋 TL;DR
CVE-2022-36028 is an open redirect vulnerability in Greenlight, the web interface for BigBlueButton servers. Attackers can manipulate the 'return_to' cookie during login to redirect users to malicious websites after authentication. This affects all Greenlight installations prior to version 2.13.0.
💻 Affected Systems
- Greenlight (BigBlueButton web interface)
📦 What is this software?
Greenlight by Bigbluebutton
⚠️ Risk & Real-World Impact
Worst Case
Users could be redirected to phishing sites that steal credentials or deliver malware, potentially compromising entire organizations through credential theft or malware infections.
Likely Case
Attackers redirect authenticated users to phishing pages to steal session tokens or credentials, leading to account compromise.
If Mitigated
With proper user awareness training and browser security controls, users might recognize suspicious redirects, limiting damage to isolated incidents.
🎯 Exploit Status
The exploit requires no authentication and is simple to execute by manipulating cookie values. Proof-of-concept details are available in public repositories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.13.0
Vendor Advisory: https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623
Restart Required: Yes
Instructions:
1. Backup your Greenlight installation and database. 2. Update to Greenlight version 2.13.0 or later. 3. Restart the Greenlight service. 4. Verify the fix by testing the login redirect functionality.
🔧 Temporary Workarounds
Cookie Validation Filter
allImplement server-side validation to ensure 'return_to' cookie values only contain allowed domains
Modify Greenlight source code to validate return_to parameter against allowed domains
🧯 If You Can't Patch
- Implement WAF rules to block redirects to external domains from login endpoints
- Monitor logs for suspicious redirect patterns and implement user awareness training about phishing risks
🔍 How to Verify
Check if Vulnerable:
Test by setting a malicious 'return_to' cookie during login and checking if redirect occurs to external domain
Check Version:
Check Greenlight version in web interface or run 'cat /usr/share/bbb-web/config/initializers/version.rb' on server
Verify Fix Applied:
After patching, attempt the same exploit - redirects should only go to allowed internal domains
📡 Detection & Monitoring
Log Indicators:
- Unusual redirect patterns in access logs
- Login attempts with suspicious return_to parameters
Network Indicators:
- HTTP 302 redirects to external domains after successful authentication
SIEM Query:
source="greenlight_access.log" AND (status=302 OR status=301) AND url CONTAINS "return_to" AND url NOT CONTAINS "allowed-domain.com"
🔗 References
- https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623
- https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://
- https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623
- https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://