Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-21690
HistoryJan 18, 2022 - 10:15 p.m.

CVE-2022-21690 Cross-Site Scripting in Onionshare

2022-01-1822:15:18
CWE-79
GitHub_M
www.cve.org
3
onionshare
cross-site scripting
cve-2022-21690
file sharing
tor network

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

21.4%

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.

CNA Affected

[
  {
    "product": "onionshare",
    "vendor": "onionshare",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.5"
      }
    ]
  }
]

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

21.4%