Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-41868 (GCVE-0-2021-41868)
Vulnerability from cvelistv5
Published
2021-10-04 13:45
Modified
2024-08-04 03:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-04T13:45:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "url": "https://www.ihteam.net/advisory/onionshare/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41868", "datePublished": "2021-10-04T13:45:49", "dateReserved": "2021-10-04T00:00:00", "dateUpdated": "2024-08-04T03:22:25.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-41868\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-04T14:15:07.737\",\"lastModified\":\"2024-11-21T06:26:55.643\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.\"},{\"lang\":\"es\",\"value\":\"poly VVX 400/410 versiones hasta 5.3.1, permite a usuarios con pocos privilegios cambiar la contrase\u00f1a de Administrador al modificar un par\u00e1metro POST a 120 durante el proceso de restablecimiento de la contrase\u00f1a\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3\",\"versionEndExcluding\":\"2.4\",\"matchCriteriaId\":\"F304926B-8CC3-4F3B-AF40-0B93625651DA\"}]}]}],\"references\":[{\"url\":\"https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.ihteam.net/advisory/onionshare/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.ihteam.net/advisory/onionshare/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2021-41868
Vulnerability from fkie_nvd
Published
2021-10-04 14:15
Modified
2024-11-21 06:26
Severity ?
Summary
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
cve@mitre.org | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ihteam.net/advisory/onionshare/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
onionshare | onionshare | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*", "matchCriteriaId": "F304926B-8CC3-4F3B-AF40-0B93625651DA", "versionEndExcluding": "2.4", "versionStartIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." }, { "lang": "es", "value": "poly VVX 400/410 versiones hasta 5.3.1, permite a usuarios con pocos privilegios cambiar la contrase\u00f1a de Administrador al modificar un par\u00e1metro POST a 120 durante el proceso de restablecimiento de la contrase\u00f1a" } ], "id": "CVE-2021-41868", "lastModified": "2024-11-21T06:26:55.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-04T14:15:07.737", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2021-41868
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-41868", "description": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "id": "GSD-2021-41868", "references": [ "https://www.suse.com/security/cve/CVE-2021-41868.html", "https://security.archlinux.org/CVE-2021-41868" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-41868" ], "details": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "id": "GSD-2021-41868", "modified": "2023-12-13T01:23:27.521289Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "url": "https://www.ihteam.net/advisory/onionshare/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2.3,\u003c2.4", "affected_versions": "All versions starting from 2.3 before 2.4", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-11-19", "description": "OnionShare allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "fixed_versions": [ "2.4" ], "identifier": "CVE-2021-41868", "identifiers": [ "GHSA-7g47-xxff-9p85", "CVE-2021-41868" ], "not_impacted": "All versions before 2.3, all versions starting from 2.4", "package_slug": "pypi/onionshare-cli", "pubdate": "2021-11-19", "solution": "Upgrade to version 2.4 or above.", "title": "Remote unauthenticated attackers able to upload files in Onionshare", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-41868", "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "https://www.ihteam.net/advisory/onionshare/", "https://github.com/advisories/GHSA-7g47-xxff-9p85" ], "uuid": "d4955032-2814-4042-8645-954ac1e96a31" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.4", "versionStartIncluding": "2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41868" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4" }, { "name": "https://www.ihteam.net/advisory/onionshare/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ihteam.net/advisory/onionshare/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2021-10-12T18:28Z", "publishedDate": "2021-10-04T14:15Z" } } }
cnvd-2022-06481
Vulnerability from cnvd
Title: OnionShare文件上传漏洞
Description:
OnionShare是一种开源工具。用于安全且匿名地共享文件、托管网站以及使用 Tor 网络与朋友聊天。
OnionShare存在文件上传漏洞,攻击者可利用该漏洞将文件上传到非公共节点。
Severity: 高
Patch Name: OnionShare文件上传漏洞的补丁
Patch Description:
OnionShare是一种开源工具。用于安全且匿名地共享文件、托管网站以及使用 Tor 网络与朋友聊天。
OnionShare存在文件上传漏洞,攻击者可利用该漏洞将文件上传到非公共节点。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-41868
Impacted products
Name | OnionShare OnionShare 2.3 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-41868" } }, "description": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\n\nOnionShare\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u6587\u4ef6\u4e0a\u4f20\u5230\u975e\u516c\u5171\u8282\u70b9\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/onionshare/onionshare/compare/v2.3.3...v2.4", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-06481", "openTime": "2022-01-25", "patchDescription": "OnionShare\u662f\u4e00\u79cd\u5f00\u6e90\u5de5\u5177\u3002\u7528\u4e8e\u5b89\u5168\u4e14\u533f\u540d\u5730\u5171\u4eab\u6587\u4ef6\u3001\u6258\u7ba1\u7f51\u7ad9\u4ee5\u53ca\u4f7f\u7528 Tor \u7f51\u7edc\u4e0e\u670b\u53cb\u804a\u5929\u3002\r\n\r\nOnionShare\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u6587\u4ef6\u4e0a\u4f20\u5230\u975e\u516c\u5171\u8282\u70b9\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "OnionShare\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "OnionShare OnionShare 2.3" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-41868", "serverity": "\u9ad8", "submitTime": "2021-10-09", "title": "OnionShare\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e" }
ghsa-7g47-xxff-9p85
Vulnerability from github
Published
2021-11-19 20:39
Modified
2021-10-13 17:28
Severity ?
VLAI Severity ?
Summary
Remote unauthenticated attackers able to upload files in Onionshare
Details
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "onionshare-cli" }, "ranges": [ { "events": [ { "introduced": "2.3" }, { "fixed": "2.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-41868" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2021-10-05T15:16:37Z", "nvd_published_at": "2021-10-04T14:15:00Z", "severity": "CRITICAL" }, "details": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality. ", "id": "GHSA-7g47-xxff-9p85", "modified": "2021-10-13T17:28:16Z", "published": "2021-11-19T20:39:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41868" }, { "type": "WEB", "url": "https://github.com/onionshare/onionshare/issues/1396" }, { "type": "WEB", "url": "https://github.com/onionshare/onionshare/pull/1404" }, { "type": "PACKAGE", "url": "https://github.com/onionshare/onionshare" }, { "type": "WEB", "url": "https://www.ihteam.net/advisory/onionshare" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Remote unauthenticated attackers able to upload files in Onionshare" }
opensuse-su-2024:13635-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python3-onionshare-2.6-4.1 on GA media
Notes
Title of the patch
python3-onionshare-2.6-4.1 on GA media
Description of the patch
These are all security issues fixed in the python3-onionshare-2.6-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13635
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "python3-onionshare-2.6-4.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the python3-onionshare-2.6-4.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13635", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13635-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19960 page", "url": "https://www.suse.com/security/cve/CVE-2018-19960/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41867 page", "url": "https://www.suse.com/security/cve/CVE-2021-41867/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41868 page", "url": "https://www.suse.com/security/cve/CVE-2021-41868/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21688 page", "url": "https://www.suse.com/security/cve/CVE-2022-21688/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21690 page", "url": "https://www.suse.com/security/cve/CVE-2022-21690/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21691 page", "url": "https://www.suse.com/security/cve/CVE-2022-21691/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21692 page", "url": "https://www.suse.com/security/cve/CVE-2022-21692/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21693 page", "url": "https://www.suse.com/security/cve/CVE-2022-21693/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21694 page", "url": "https://www.suse.com/security/cve/CVE-2022-21694/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21695 page", "url": "https://www.suse.com/security/cve/CVE-2022-21695/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21696 page", "url": "https://www.suse.com/security/cve/CVE-2022-21696/" } ], "title": "python3-onionshare-2.6-4.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13635-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.aarch64", "product": { "name": "python3-onionshare-2.6-4.1.aarch64", "product_id": "python3-onionshare-2.6-4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.ppc64le", "product": { "name": "python3-onionshare-2.6-4.1.ppc64le", "product_id": "python3-onionshare-2.6-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.s390x", "product": { "name": "python3-onionshare-2.6-4.1.s390x", "product_id": "python3-onionshare-2.6-4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python3-onionshare-2.6-4.1.x86_64", "product": { "name": "python3-onionshare-2.6-4.1.x86_64", "product_id": "python3-onionshare-2.6-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64" }, "product_reference": "python3-onionshare-2.6-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le" }, "product_reference": "python3-onionshare-2.6-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x" }, "product_reference": "python3-onionshare-2.6-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python3-onionshare-2.6-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" }, "product_reference": "python3-onionshare-2.6-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-19960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19960" } ], "notes": [ { "category": "general", "text": "The debug_mode function in web/web.py in OnionShare through 1.3.1, when --debug is enabled, uses the /tmp/onionshare_server.log pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19960", "url": "https://www.suse.com/security/cve/CVE-2018-19960" }, { "category": "external", "summary": "SUSE Bug 1120205 for CVE-2018-19960", "url": "https://bugzilla.suse.com/1120205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19960" }, { "cve": "CVE-2021-41867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41867" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41867", "url": "https://www.suse.com/security/cve/CVE-2021-41867" }, { "category": "external", "summary": "SUSE Bug 1191311 for CVE-2021-41867", "url": "https://bugzilla.suse.com/1191311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-41867" }, { "cve": "CVE-2021-41868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41868" } ], "notes": [ { "category": "general", "text": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41868", "url": "https://www.suse.com/security/cve/CVE-2021-41868" }, { "category": "external", "summary": "SUSE Bug 1191312 for CVE-2021-41868", "url": "https://bugzilla.suse.com/1191312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41868" }, { "cve": "CVE-2022-21688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21688" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21688", "url": "https://www.suse.com/security/cve/CVE-2022-21688" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21688", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21688" }, { "cve": "CVE-2022-21690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21690" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21690", "url": "https://www.suse.com/security/cve/CVE-2022-21690" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21690", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21690" }, { "cve": "CVE-2022-21691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21691" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21691", "url": "https://www.suse.com/security/cve/CVE-2022-21691" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21691", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21691" }, { "cve": "CVE-2022-21692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21692" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21692", "url": "https://www.suse.com/security/cve/CVE-2022-21692" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21692", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21692" }, { "cve": "CVE-2022-21693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21693" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21693", "url": "https://www.suse.com/security/cve/CVE-2022-21693" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21693", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21693" }, { "cve": "CVE-2022-21694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21694" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21694", "url": "https://www.suse.com/security/cve/CVE-2022-21694" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21694", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21694" }, { "cve": "CVE-2022-21695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21695" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21695", "url": "https://www.suse.com/security/cve/CVE-2022-21695" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21695", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21695" }, { "cve": "CVE-2022-21696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21696" } ], "notes": [ { "category": "general", "text": "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21696", "url": "https://www.suse.com/security/cve/CVE-2022-21696" }, { "category": "external", "summary": "SUSE Bug 1194866 for CVE-2022-21696", "url": "https://bugzilla.suse.com/1194866" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.aarch64", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.ppc64le", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.s390x", "openSUSE Tumbleweed:python3-onionshare-2.6-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-21696" } ] }
opensuse-su-2024:11557-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python-onionshare-2.4-1.1 on GA media
Notes
Title of the patch
python-onionshare-2.4-1.1 on GA media
Description of the patch
These are all security issues fixed in the python-onionshare-2.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11557
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "python-onionshare-2.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the python-onionshare-2.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11557", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11557-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41867 page", "url": "https://www.suse.com/security/cve/CVE-2021-41867/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41868 page", "url": "https://www.suse.com/security/cve/CVE-2021-41868/" } ], "title": "python-onionshare-2.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11557-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.aarch64", "product": { "name": "python-onionshare-2.4-1.1.aarch64", "product_id": "python-onionshare-2.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.ppc64le", "product": { "name": "python-onionshare-2.4-1.1.ppc64le", "product_id": "python-onionshare-2.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.s390x", "product": { "name": "python-onionshare-2.4-1.1.s390x", "product_id": "python-onionshare-2.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-onionshare-2.4-1.1.x86_64", "product": { "name": "python-onionshare-2.4-1.1.x86_64", "product_id": "python-onionshare-2.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64" }, "product_reference": "python-onionshare-2.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le" }, "product_reference": "python-onionshare-2.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x" }, "product_reference": "python-onionshare-2.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python-onionshare-2.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" }, "product_reference": "python-onionshare-2.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41867" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41867", "url": "https://www.suse.com/security/cve/CVE-2021-41867" }, { "category": "external", "summary": "SUSE Bug 1191311 for CVE-2021-41867", "url": "https://bugzilla.suse.com/1191311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-41867" }, { "cve": "CVE-2021-41868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41868" } ], "notes": [ { "category": "general", "text": "OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41868", "url": "https://www.suse.com/security/cve/CVE-2021-41868" }, { "category": "external", "summary": "SUSE Bug 1191312 for CVE-2021-41868", "url": "https://bugzilla.suse.com/1191312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:python-onionshare-2.4-1.1.aarch64", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.ppc64le", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.s390x", "openSUSE Tumbleweed:python-onionshare-2.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41868" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…