Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-21692 (GCVE-0-2022-21692)
Vulnerability from cvelistv5 – Published: 2022-01-18 22:10 – Updated: 2025-04-22 18:33- CWE-287 - Improper Authentication
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| onionshare | onionshare |
Affected:
< 2.5
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:53:34.717Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-21692",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-22T15:52:15.078659Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-22T18:33:15.871Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "onionshare",
"vendor": "onionshare",
"versions": [
{
"status": "affected",
"version": "\u003c 2.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287: Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-18T22:10:15.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
}
],
"source": {
"advisory": "GHSA-gjj5-998g-v36v",
"discovery": "UNKNOWN"
},
"title": "Improper Access Control in Onionshare",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21692",
"STATE": "PUBLIC",
"TITLE": "Improper Access Control in Onionshare"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "onionshare",
"version": {
"version_data": [
{
"version_value": "\u003c 2.5"
}
]
}
}
]
},
"vendor_name": "onionshare"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287: Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/onionshare/onionshare/releases/tag/v2.5",
"refsource": "MISC",
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v",
"refsource": "CONFIRM",
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
}
]
},
"source": {
"advisory": "GHSA-gjj5-998g-v36v",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-21692",
"datePublished": "2022-01-18T22:10:15.000Z",
"dateReserved": "2021-11-16T00:00:00.000Z",
"dateUpdated": "2025-04-22T18:33:15.871Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-21692",
"date": "2026-04-24",
"epss": "0.00152",
"percentile": "0.35571"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-21692\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-18T23:15:08.710\",\"lastModified\":\"2024-11-21T06:45:14.647\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.\"},{\"lang\":\"es\",\"value\":\"OnionShare es una herramienta de c\u00f3digo abierto que permite compartir archivos, alojar sitios web y chatear con amigos de forma segura y an\u00f3nima usando la red Tor. En las versiones afectadas, cualquier persona con acceso al entorno de chat puede escribir mensajes disfrazado de otro participante en el chat\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:P/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.5\",\"matchCriteriaId\":\"B3A7A46B-5812-492A-B66B-DC43A15A0A38\"}]}]}],\"references\":[{\"url\":\"https://github.com/onionshare/onionshare/releases/tag/v2.5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/onionshare/onionshare/releases/tag/v2.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"product\": \"onionshare\", \"vendor\": \"onionshare\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.5\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-287\", \"description\": \"CWE-287: Improper Authentication\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-01-18T22:10:15.000Z\", \"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/onionshare/onionshare/releases/tag/v2.5\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\"}], \"source\": {\"advisory\": \"GHSA-gjj5-998g-v36v\", \"discovery\": \"UNKNOWN\"}, \"title\": \"Improper Access Control in Onionshare\", \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"security-advisories@github.com\", \"ID\": \"CVE-2022-21692\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Improper Access Control in Onionshare\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"onionshare\", \"version\": {\"version_data\": [{\"version_value\": \"\u003c 2.5\"}]}}]}, \"vendor_name\": \"onionshare\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.\"}]}, \"impact\": {\"cvss\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-287: Improper Authentication\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://github.com/onionshare/onionshare/releases/tag/v2.5\", \"refsource\": \"MISC\", \"url\": \"https://github.com/onionshare/onionshare/releases/tag/v2.5\"}, {\"name\": \"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\", \"refsource\": \"CONFIRM\", \"url\": \"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\"}]}, \"source\": {\"advisory\": \"GHSA-gjj5-998g-v36v\", \"discovery\": \"UNKNOWN\"}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T02:53:34.717Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/onionshare/onionshare/releases/tag/v2.5\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-21692\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T15:52:15.078659Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-22T15:52:16.871Z\"}}]}",
"cveMetadata": "{\"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"assignerShortName\": \"GitHub_M\", \"cveId\": \"CVE-2022-21692\", \"datePublished\": \"2022-01-18T22:10:15.000Z\", \"dateReserved\": \"2021-11-16T00:00:00.000Z\", \"dateUpdated\": \"2025-04-22T18:33:15.871Z\", \"state\": \"PUBLISHED\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
OPENSUSE-SU-2024:13635-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python3-onionshare-2.6-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python3-onionshare-2.6-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13635",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13635-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19960 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41867 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41868 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21688 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21690 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21690/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21691 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21692 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21694 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21695 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21696 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21696/"
}
],
"title": "python3-onionshare-2.6-4.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13635-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python3-onionshare-2.6-4.1.aarch64",
"product": {
"name": "python3-onionshare-2.6-4.1.aarch64",
"product_id": "python3-onionshare-2.6-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-onionshare-2.6-4.1.ppc64le",
"product": {
"name": "python3-onionshare-2.6-4.1.ppc64le",
"product_id": "python3-onionshare-2.6-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-onionshare-2.6-4.1.s390x",
"product": {
"name": "python3-onionshare-2.6-4.1.s390x",
"product_id": "python3-onionshare-2.6-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-onionshare-2.6-4.1.x86_64",
"product": {
"name": "python3-onionshare-2.6-4.1.x86_64",
"product_id": "python3-onionshare-2.6-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-onionshare-2.6-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64"
},
"product_reference": "python3-onionshare-2.6-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-onionshare-2.6-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le"
},
"product_reference": "python3-onionshare-2.6-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-onionshare-2.6-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x"
},
"product_reference": "python3-onionshare-2.6-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-onionshare-2.6-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
},
"product_reference": "python3-onionshare-2.6-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-19960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19960"
}
],
"notes": [
{
"category": "general",
"text": "The debug_mode function in web/web.py in OnionShare through 1.3.1, when --debug is enabled, uses the /tmp/onionshare_server.log pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19960",
"url": "https://www.suse.com/security/cve/CVE-2018-19960"
},
{
"category": "external",
"summary": "SUSE Bug 1120205 for CVE-2018-19960",
"url": "https://bugzilla.suse.com/1120205"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-19960"
},
{
"cve": "CVE-2021-41867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41867"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41867",
"url": "https://www.suse.com/security/cve/CVE-2021-41867"
},
{
"category": "external",
"summary": "SUSE Bug 1191311 for CVE-2021-41867",
"url": "https://bugzilla.suse.com/1191311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-41867"
},
{
"cve": "CVE-2021-41868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41868"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41868",
"url": "https://www.suse.com/security/cve/CVE-2021-41868"
},
{
"category": "external",
"summary": "SUSE Bug 1191312 for CVE-2021-41868",
"url": "https://bugzilla.suse.com/1191312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-41868"
},
{
"cve": "CVE-2022-21688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21688"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21688",
"url": "https://www.suse.com/security/cve/CVE-2022-21688"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21688",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21688"
},
{
"cve": "CVE-2022-21690",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21690"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21690",
"url": "https://www.suse.com/security/cve/CVE-2022-21690"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21690",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21690"
},
{
"cve": "CVE-2022-21691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21691"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21691",
"url": "https://www.suse.com/security/cve/CVE-2022-21691"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21691",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21691"
},
{
"cve": "CVE-2022-21692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21692"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21692",
"url": "https://www.suse.com/security/cve/CVE-2022-21692"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21692",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21692"
},
{
"cve": "CVE-2022-21693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21693"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21693",
"url": "https://www.suse.com/security/cve/CVE-2022-21693"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21693",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21693"
},
{
"cve": "CVE-2022-21694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21694"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21694",
"url": "https://www.suse.com/security/cve/CVE-2022-21694"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21694",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21694"
},
{
"cve": "CVE-2022-21695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21695"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21695",
"url": "https://www.suse.com/security/cve/CVE-2022-21695"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21695",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21695"
},
{
"cve": "CVE-2022-21696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21696"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21696",
"url": "https://www.suse.com/security/cve/CVE-2022-21696"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21696",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x",
"openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21696"
}
]
}
OPENSUSE-SU-2024:11983-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python-onionshare-2.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python-onionshare-2.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11983",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11983-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21688 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21690 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21690/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21691 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21692 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21693 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21694 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21695 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21696 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21696/"
}
],
"title": "python-onionshare-2.5-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11983-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-onionshare-2.5-1.1.aarch64",
"product": {
"name": "python-onionshare-2.5-1.1.aarch64",
"product_id": "python-onionshare-2.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-onionshare-2.5-1.1.ppc64le",
"product": {
"name": "python-onionshare-2.5-1.1.ppc64le",
"product_id": "python-onionshare-2.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-onionshare-2.5-1.1.s390x",
"product": {
"name": "python-onionshare-2.5-1.1.s390x",
"product_id": "python-onionshare-2.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-onionshare-2.5-1.1.x86_64",
"product": {
"name": "python-onionshare-2.5-1.1.x86_64",
"product_id": "python-onionshare-2.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-onionshare-2.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64"
},
"product_reference": "python-onionshare-2.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-onionshare-2.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le"
},
"product_reference": "python-onionshare-2.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-onionshare-2.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x"
},
"product_reference": "python-onionshare-2.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-onionshare-2.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
},
"product_reference": "python-onionshare-2.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21688"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21688",
"url": "https://www.suse.com/security/cve/CVE-2022-21688"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21688",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21688"
},
{
"cve": "CVE-2022-21690",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21690"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21690",
"url": "https://www.suse.com/security/cve/CVE-2022-21690"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21690",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21690"
},
{
"cve": "CVE-2022-21691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21691"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21691",
"url": "https://www.suse.com/security/cve/CVE-2022-21691"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21691",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21691"
},
{
"cve": "CVE-2022-21692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21692"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21692",
"url": "https://www.suse.com/security/cve/CVE-2022-21692"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21692",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21692"
},
{
"cve": "CVE-2022-21693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21693"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21693",
"url": "https://www.suse.com/security/cve/CVE-2022-21693"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21693",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21693"
},
{
"cve": "CVE-2022-21694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21694"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21694",
"url": "https://www.suse.com/security/cve/CVE-2022-21694"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21694",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21694"
},
{
"cve": "CVE-2022-21695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21695"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21695",
"url": "https://www.suse.com/security/cve/CVE-2022-21695"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21695",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21695"
},
{
"cve": "CVE-2022-21696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21696"
}
],
"notes": [
{
"category": "general",
"text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21696",
"url": "https://www.suse.com/security/cve/CVE-2022-21696"
},
{
"category": "external",
"summary": "SUSE Bug 1194866 for CVE-2022-21696",
"url": "https://bugzilla.suse.com/1194866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.aarch64",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.ppc64le",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.s390x",
"openSUSE Tumbleweed:python-onionshare-2.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-21696"
}
]
}
GSD-2022-21692
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-21692",
"description": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"id": "GSD-2022-21692",
"references": [
"https://www.suse.com/security/cve/CVE-2022-21692.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-21692"
],
"details": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"id": "GSD-2022-21692",
"modified": "2023-12-13T01:19:14.533885Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21692",
"STATE": "PUBLIC",
"TITLE": "Improper Access Control in Onionshare"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "onionshare",
"version": {
"version_data": [
{
"version_value": "\u003c 2.5"
}
]
}
}
]
},
"vendor_name": "onionshare"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287: Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/onionshare/onionshare/releases/tag/v2.5",
"refsource": "MISC",
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v",
"refsource": "CONFIRM",
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
}
]
},
"source": {
"advisory": "GHSA-gjj5-998g-v36v",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c2.5",
"affected_versions": "All versions before 2.5",
"cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-287",
"CWE-937"
],
"date": "2022-01-21",
"description": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"fixed_versions": [
"2.5"
],
"identifier": "CVE-2022-21692",
"identifiers": [
"GHSA-gjj5-998g-v36v",
"CVE-2022-21692"
],
"not_impacted": "All versions starting from 2.5",
"package_slug": "pypi/onionshare-cli",
"pubdate": "2022-01-21",
"solution": "Upgrade to version 2.5 or above.",
"title": "Improper Authentication",
"urls": [
"https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v",
"https://github.com/onionshare/onionshare/releases/tag/v2.5",
"https://nvd.nist.gov/vuln/detail/CVE-2022-21692",
"https://github.com/advisories/GHSA-gjj5-998g-v36v"
],
"uuid": "0e0c1372-71de-4fbd-b27b-3ccd2f48a45b"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21692"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
},
{
"name": "https://github.com/onionshare/onionshare/releases/tag/v2.5",
"refsource": "MISC",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
},
"lastModifiedDate": "2022-01-24T21:05Z",
"publishedDate": "2022-01-18T23:15Z"
}
}
}
PYSEC-2022-43
Vulnerability from pysec - Published: 2022-01-18 23:15 - Updated: 2022-03-09 00:16OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.
| Name | purl | onionshare-cli | pkg:pypi/onionshare-cli |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "onionshare-cli",
"purl": "pkg:pypi/onionshare-cli"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"2.3",
"2.3.1",
"2.3.2",
"2.3.3"
]
}
],
"aliases": [
"CVE-2022-21692",
"GHSA-gjj5-998g-v36v"
],
"details": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.",
"id": "PYSEC-2022-43",
"modified": "2022-03-09T00:16:43.273792Z",
"published": "2022-01-18T23:15:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
},
{
"type": "WEB",
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
}
]
}
FKIE_CVE-2022-21692
Vulnerability from fkie_nvd - Published: 2022-01-18 23:15 - Updated: 2024-11-21 06:454.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/onionshare/onionshare/releases/tag/v2.5 | Release Notes, Third Party Advisory | |
| security-advisories@github.com | https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/releases/tag/v2.5 | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| onionshare | onionshare | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A7A46B-5812-492A-B66B-DC43A15A0A38",
"versionEndExcluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant."
},
{
"lang": "es",
"value": "OnionShare es una herramienta de c\u00f3digo abierto que permite compartir archivos, alojar sitios web y chatear con amigos de forma segura y an\u00f3nima usando la red Tor. En las versiones afectadas, cualquier persona con acceso al entorno de chat puede escribir mensajes disfrazado de otro participante en el chat"
}
],
"id": "CVE-2022-21692",
"lastModified": "2024-11-21T06:45:14.647",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-18T23:15:08.710",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2022-06478
Vulnerability from cnvd - Published: 2022-01-25厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/onionshare/onionshare/releases/tag/v2.5
| Name | OnionShare OnionShare |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-21692"
}
},
"description": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\n\nOnionShare\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728\u53d7\u5f71\u54cd\u7684\u7248\u672c\u4e2d\uff0c\u4efb\u4f55\u8bbf\u95ee\u804a\u5929\u73af\u5883\u7684\u4eba\u90fd\u53ef\u7f16\u5199\u4f2a\u88c5\u6210\u53e6\u4e00\u4e2a\u804a\u5929\u53c2\u4e0e\u8005\u7684\u6d88\u606f\u3002 \u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/onionshare/onionshare/releases/tag/v2.5",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-06478",
"openTime": "2022-01-25",
"patchDescription": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\r\n\r\nOnionShare\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728\u53d7\u5f71\u54cd\u7684\u7248\u672c\u4e2d\uff0c\u4efb\u4f55\u8bbf\u95ee\u804a\u5929\u73af\u5883\u7684\u4eba\u90fd\u53ef\u7f16\u5199\u4f2a\u88c5\u6210\u53e6\u4e00\u4e2a\u804a\u5929\u53c2\u4e0e\u8005\u7684\u6d88\u606f\u3002 \u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OnionShare\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-06478\uff09\u7684\u8865\u4e01",
"products": {
"product": "OnionShare OnionShare"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-21692",
"serverity": "\u4e2d",
"submitTime": "2022-01-19",
"title": "OnionShare\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-06478\uff09"
}
GHSA-GJJ5-998G-V36V
Vulnerability from github – Published: 2022-01-21 23:20 – Updated: 2024-10-07 21:20Between September 26, 2021 and October 8, 2021, Radically Open Security conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's Red Team lab. This is an issue from that penetration test.
- Vulnerability ID: OTF-003
- Vulnerability type: Improper Access Control
- Threat level: Moderate
Description:
Anyone with access to the chat environment can write messages disguised as another chat participant.
Technical description:
Prerequisites:
- Alice and Bob are legitimate users
- A third user has access to the chat environment

This screenshot shows Alice (glimpse-depress) and Bob (blinker-doorpost) joined a chatroom and are the only participants in the chatroom. Then the non-listed user squad-nursing writes a message in the chatroom without being visible in the list of users. The sending of the message itself is not required but was done here to show the initial access. The non-listed participant now renames himself to Bob and writes another message, seemingly coming from Bob.
This can be reproduced by slightly modifying the client-side JavaScript. The joined emit needs to be removed from the socket.on(connect)event handler. Therefore a client is not listed in the userlist and has no active session.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/resources/static/js/chat.js#L16-L18
This can be done either via a crafted client or runtime modification of the chat.js script in the browser's internal debugger.
It is still possible to call the text method and send text to the chat via websocket.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L131-L139
It is also possible to call the update_username function and choose an existing username from the chat.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L141-L162
Afterwards the hidden user can send messages that are displayed as coming from the impersonated user. There is no way to distinguish between the fake and original message.
Impact:
An adversary with access to the chat environment can impersonate existing chat participants and write messages but not read the conversation. The similar exploit described in OTF-004 (page 19) has only slightly more requirements but also allows for reading.
Recommendation:
- Implement proper session handling
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "onionshare-cli"
},
"ranges": [
{
"events": [
{
"introduced": "2.3"
},
{
"fixed": "2.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-21692"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": true,
"github_reviewed_at": "2022-01-19T19:20:26Z",
"nvd_published_at": "2022-01-18T23:15:00Z",
"severity": "MODERATE"
},
"details": "Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund\u0027s [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.\n\n- Vulnerability ID: OTF-003\n- Vulnerability type: Improper Access Control\n- Threat level: Moderate\n\n## Description:\n\nAnyone with access to the chat environment can write messages disguised as another chat participant.\n\n## Technical description:\n\nPrerequisites:\n\n- Alice and Bob are legitimate users\n- A third user has access to the chat environment\n\n\n\nThis screenshot shows Alice (`glimpse-depress`) and Bob (`blinker-doorpost`) joined a chatroom and are the only participants in the chatroom. Then the non-listed user squad-nursing writes a message in the chatroom without being visible in the list of users. The sending of the message itself is not required but was done here to show the initial access. The non-listed participant now renames himself to Bob and writes another message, seemingly coming from Bob.\n\nThis can be reproduced by slightly modifying the client-side JavaScript. The `joined` emit needs to be removed from the `socket.on(connect) `event handler. Therefore a client is not listed in the userlist and has no active session.\n\nhttps://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/resources/static/js/chat.js#L16-L18\n\nThis can be done either via a crafted client or runtime modification of the `chat.js` script in the browser\u0027s internal debugger.\n\nIt is still possible to call the text method and send text to the chat via websocket.\n\nhttps://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L131-L139\n\nIt is also possible to call the `update_username` function and choose an existing username from the chat.\n\nhttps://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L141-L162\n\nAfterwards the hidden user can send messages that are displayed as coming from the impersonated user. There is no way to distinguish between the fake and original message.\n\n## Impact:\n\nAn adversary with access to the chat environment can impersonate existing chat participants and write messages but not read the conversation. The similar exploit described in OTF-004 (page 19) has only slightly more requirements but also allows for reading.\n\n## Recommendation:\n\n- Implement proper session handling",
"id": "GHSA-gjj5-998g-v36v",
"modified": "2024-10-07T21:20:07Z",
"published": "2022-01-21T23:20:21Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21692"
},
{
"type": "PACKAGE",
"url": "https://github.com/onionshare/onionshare"
},
{
"type": "WEB",
"url": "https://github.com/onionshare/onionshare/releases/tag/v2.5"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/onionshare-cli/PYSEC-2022-43.yaml"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Improper Access Control in Onionshare"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.