CVE-2022-21694

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-21694
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21694.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-21694
Aliases
Related
Published
2022-01-18T23:15:08Z
Modified
2024-09-03T04:10:28.535912Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.

References

Affected packages

Debian:11 / onionshare

Package

Name
onionshare
Purl
pkg:deb/debian/onionshare?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2-3
2.2-3+deb11u1
2.2-3+deb11u2
2.5-1
2.5-2
2.6-1
2.6-2
2.6-3
2.6-4
2.6-5~deb12u1
2.6-5
2.6-6
2.6-7
2.6.2-1
2.6.2-2
2.6.2-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / onionshare

Package

Name
onionshare
Purl
pkg:deb/debian/onionshare?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / onionshare

Package

Name
onionshare
Purl
pkg:deb/debian/onionshare?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/micahflee/onionshare

Affected ranges

Type
GIT
Repo
https://github.com/micahflee/onionshare
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.2
0.3
0.4
0.5
0.6
0.7
0.7.1
0.8

v0.*

v0.8.1
v0.9
v0.9.1
v0.9.2

v1.*

v1.0
v1.0dev1
v1.1
v1.1.dev1
v1.1.dev2
v1.2
v1.3
v1.3.1
v1.3.2

v2.*

v2.0.dev1
v2.0.dev2
v2.0.dev3
v2.1.dev1
v2.2.dev1
v2.3
v2.3.1
v2.3.2
v2.3.2.dev1
v2.3.dev1
v2.3.dev2
v2.4.dev1