Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-41867 (GCVE-0-2021-41867)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-04T13:48:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "url": "https://www.ihteam.net/advisory/onionshare/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41867", "datePublished": "2021-10-04T13:48:07", "dateReserved": "2021-10-04T00:00:00", "dateUpdated": "2024-08-04T03:22:25.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-41867\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-04T14:15:07.693\",\"lastModified\":\"2024-11-21T06:26:55.510\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en OnionShare versiones 2.3 anteriores a 2.4, permiten a atacantes remotos no autenticados recuperar la lista completa de participantes de un nodo OnionShare no p\u00fablico por medio de la funcionalidad --chat\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3\",\"versionEndExcluding\":\"2.4\",\"matchCriteriaId\":\"F304926B-8CC3-4F3B-AF40-0B93625651DA\"}]}]}],\"references\":[{\"url\":\"https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.ihteam.net/advisory/onionshare/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.ihteam.net/advisory/onionshare/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:13635-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "python3-onionshare-2.6-4.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the python3-onionshare-2.6-4.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13635", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13635-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19960 page", "url": "https://www.suse.com/security/cve/CVE-2018-19960/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41867 page", "url": "https://www.suse.com/security/cve/CVE-2021-41867/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41868 page", "url": "https://www.suse.com/security/cve/CVE-2021-41868/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21688 page", "url": "https://www.suse.com/security/cve/CVE-2022-21688/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21690 page", "url": "https://www.suse.com/security/cve/CVE-2022-21690/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21691 page", "url": "https://www.suse.com/security/cve/CVE-2022-21691/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21692 page", "url": "https://www.suse.com/security/cve/CVE-2022-21692/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21693 page", "url": "https://www.suse.com/security/cve/CVE-2022-21693/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21694 page", "url": "https://www.suse.com/security/cve/CVE-2022-21694/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21695 page", "url": "https://www.suse.com/security/cve/CVE-2022-21695/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21696 page", "url": "https://www.suse.com/security/cve/CVE-2022-21696/" } ], "title": "python3-onionshare-2.6-4.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13635-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.aarch64", "product": { "name": "python3-onionshare-2.6-4.1.aarch64", "product_id": "python3-onionshare-2.6-4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.ppc64le", "product": { "name": "python3-onionshare-2.6-4.1.ppc64le", "product_id": "python3-onionshare-2.6-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.s390x", "product": { "name": "python3-onionshare-2.6-4.1.s390x", "product_id": "python3-onionshare-2.6-4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.x86_64", "product": { "name": "python3-onionshare-2.6-4.1.x86_64", "product_id": "python3-onionshare-2.6-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64" }, "product_reference": "python3-onionshare-2.6-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le" }, "product_reference": "python3-onionshare-2.6-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x" }, "product_reference": "python3-onionshare-2.6-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" }, "product_reference": "python3-onionshare-2.6-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-19960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19960" } ], "notes": [ { "category": "general", "text": "The debug_mode function in web/web.py in OnionShare through 1.3.1, when --debug is enabled, uses the /tmp/onionshare_server.log pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19960", "url": "https://www.suse.com/security/cve/CVE-2018-19960" }, { "category": "external", "summary": "SUSE Bug 1120205 for CVE-2018-19960", "url": "https://bugzilla.suse.com/1120205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19960" }, { "cve": "CVE-2021-41867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41867" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41867", "url": "https://www.suse.com/security/cve/CVE-2021-41867" }, { "category": "external", "summary": "SUSE Bug 1191311 for CVE-2021-41867", "url": "https://bugzilla.suse.com/1191311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-41867" }, { "cve": "CVE-2021-41868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41868" } ], "notes": [ { "category": "general", "text": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41868", "url": "https://www.suse.com/security/cve/CVE-2021-41868" }, { "category": "external", "summary": "SUSE Bug 1191312 for CVE-2021-41868", "url": "https://bugzilla.suse.com/1191312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41868" }, { "cve": "CVE-2022-21688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21688" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21688", "url": "https://www.suse.com/security/cve/CVE-2022-21688" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21688", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21688" }, { "cve": "CVE-2022-21690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21690" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21690", "url": "https://www.suse.com/security/cve/CVE-2022-21690" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21690", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21690" }, { "cve": "CVE-2022-21691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21691" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21691", "url": "https://www.suse.com/security/cve/CVE-2022-21691" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21691", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21691" }, { "cve": "CVE-2022-21692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21692" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21692", "url": "https://www.suse.com/security/cve/CVE-2022-21692" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21692", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21692" }, { "cve": "CVE-2022-21693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21693" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21693", "url": "https://www.suse.com/security/cve/CVE-2022-21693" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21693", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21693" }, { "cve": "CVE-2022-21694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21694" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21694", "url": "https://www.suse.com/security/cve/CVE-2022-21694" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21694", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21694" }, { "cve": "CVE-2022-21695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21695" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21695", "url": "https://www.suse.com/security/cve/CVE-2022-21695" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21695", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21695" }, { "cve": "CVE-2022-21696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21696" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21696", "url": "https://www.suse.com/security/cve/CVE-2022-21696" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21696", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21696" } ] }
opensuse-su-2024:11557-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "python-onionshare-2.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the python-onionshare-2.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11557", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11557-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41867 page", "url": "https://www.suse.com/security/cve/CVE-2021-41867/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41868 page", "url": "https://www.suse.com/security/cve/CVE-2021-41868/" } ], "title": "python-onionshare-2.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11557-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.aarch64", "product": { "name": "python-onionshare-2.4-1.1.aarch64", "product_id": "python-onionshare-2.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.ppc64le", "product": { "name": "python-onionshare-2.4-1.1.ppc64le", "product_id": "python-onionshare-2.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.s390x", "product": { "name": "python-onionshare-2.4-1.1.s390x", "product_id": "python-onionshare-2.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.x86_64", "product": { "name": "python-onionshare-2.4-1.1.x86_64", "product_id": "python-onionshare-2.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64" }, "product_reference": "python-onionshare-2.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le" }, "product_reference": "python-onionshare-2.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x" }, "product_reference": "python-onionshare-2.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" }, "product_reference": "python-onionshare-2.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41867" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41867", "url": "https://www.suse.com/security/cve/CVE-2021-41867" }, { "category": "external", "summary": "SUSE Bug 1191311 for CVE-2021-41867", "url": "https://bugzilla.suse.com/1191311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-41867" }, { "cve": "CVE-2021-41868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41868" } ], "notes": [ { "category": "general", "text": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41868", "url": "https://www.suse.com/security/cve/CVE-2021-41868" }, { "category": "external", "summary": "SUSE Bug 1191312 for CVE-2021-41868", "url": "https://bugzilla.suse.com/1191312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41868" } ] }
ghsa-6rvj-pw9w-jcvc
Vulnerability from github
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "onionshare-cli" }, "ranges": [ { "events": [ { "introduced": "2.3" }, { "fixed": "2.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-41867" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2021-10-05T15:16:30Z", "nvd_published_at": "2021-10-04T14:15:00Z", "severity": "MODERATE" }, "details": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. ", "id": "GHSA-6rvj-pw9w-jcvc", "modified": "2021-10-13T17:27:56Z", "published": "2021-11-19T20:39:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41867" }, { "type": "PACKAGE", "url": "https://github.com/onionshare/onionshare" }, { "type": "WEB", "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "type": "WEB", "url": "https://www.ihteam.net/advisory/onionshare" } ], "schema_version": "1.4.0", "severity": [], "summary": "Information disclosure vulnerability in OnionShare" }
cnvd-2022-06480
Vulnerability from cnvd
Title: OnionShare存在未明漏洞
Description:
OnionShare是一种开源工具。用于安全且匿名地共享文件、托管网站以及使用 Tor 网络与朋友聊天。
OnionShare存在安全漏洞,攻击者可利用该漏洞通过--chat功能检索非公共OnionShare节点的完整参与者列表。
Severity: 中
Patch Name: OnionShare存在未明漏洞的补丁
Patch Description:
OnionShare是一种开源工具。用于安全且匿名地共享文件、托管网站以及使用 Tor 网络与朋友聊天。
OnionShare存在安全漏洞,攻击者可利用该漏洞通过--chat功能检索非公共OnionShare节点的完整参与者列表。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-41867
Name | OnionShare OnionShare 2.3 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-41867" } }, "description": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\n\nOnionShare\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7--chat\u529f\u80fd\u68c0\u7d22\u975e\u516c\u5171OnionShare\u8282\u70b9\u7684\u5b8c\u6574\u53c2\u4e0e\u8005\u5217\u8868\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-06480", "openTime": "2022-01-25", "patchDescription": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\r\n\r\nOnionShare\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7--chat\u529f\u80fd\u68c0\u7d22\u975e\u516c\u5171OnionShare\u8282\u70b9\u7684\u5b8c\u6574\u53c2\u4e0e\u8005\u5217\u8868\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "OnionShare\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "OnionShare OnionShare 2.3" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-41867", "serverity": "\u4e2d", "submitTime": "2021-10-09", "title": "OnionShare\u5b58\u5728\u672a\u660e\u6f0f\u6d1e" }
fkie_cve-2021-41867
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
onionshare | onionshare | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*", "matchCriteriaId": "F304926B-8CC3-4F3B-AF40-0B93625651DA", "versionEndExcluding": "2.4", "versionStartIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." }, { "lang": "es", "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en OnionShare versiones 2.3 anteriores a 2.4, permiten a atacantes remotos no autenticados recuperar la lista completa de participantes de un nodo OnionShare no p\u00fablico por medio de la funcionalidad --chat" } ], "id": "CVE-2021-41867", "lastModified": "2024-11-21T06:26:55.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-04T14:15:07.693", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2021-41867
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-41867", "description": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "id": "GSD-2021-41867", "references": [ "https://www.suse.com/security/cve/CVE-2021-41867.html", "https://security.archlinux.org/CVE-2021-41867" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-41867" ], "details": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "id": "GSD-2021-41867", "modified": "2023-12-13T01:23:27.002959Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "url": "https://www.ihteam.net/advisory/onionshare/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2.3,\u003c2.4", "affected_versions": "All versions starting from 2.3 before 2.4", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-11-19", "description": "An information disclosure vulnerability in OnionShare allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "fixed_versions": [ "2.4" ], "identifier": "CVE-2021-41867", "identifiers": [ "GHSA-6rvj-pw9w-jcvc", "CVE-2021-41867" ], "not_impacted": "All versions before 2.3, all versions starting from 2.4", "package_slug": "pypi/onionshare-cli", "pubdate": "2021-11-19", "solution": "Upgrade to version 2.4 or above.", "title": "Information disclosure vulnerability in OnionShare", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41867", "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "https://www.ihteam.net/advisory/onionshare/", "https://github.com/advisories/GHSA-6rvj-pw9w-jcvc" ], "uuid": "98dd8d9c-b3bc-41e0-836f-34d9418ad80e" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.4", "versionStartIncluding": "2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41867" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2021-10-12T18:34Z", "publishedDate": "2021-10-04T14:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.