Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-21693
HistoryJan 18, 2022 - 10:03 p.m.

CVE-2022-21693 Path traversal in Onionshare

2022-01-1822:03:54
CWE-22
GitHub_M
www.cve.org
5
cve-2022-21693
onionshare
path traversal
tor network
filesystem access
sensitive data
flatpak release

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

30.8%

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.

CNA Affected

[
  {
    "product": "onionshare",
    "vendor": "onionshare",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.5"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

30.8%