Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-21688— Out-of-bounds Read in Onionshare

CVSS 7.5 · High EPSS 0.39% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-21688

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Out-of-bounds Read in Onionshare
Source: NVD (National Vulnerability Database)
Vulnerability Description
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
OnionShare 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OnionShare是一种开源工具。用于安全且匿名地共享文件、托管网站以及使用 Tor 网络与朋友聊天。 OnionShare存在安全漏洞,该漏洞源于受影响的桌面应用程序版本被发现容易通过QT图像解析中的一个未公开的漏洞来拒绝服务。大约20个字节会导致2GB的内存消耗,这可以被多次触发。要被滥用,这个漏洞需要在历史选项卡中呈现,因此需要一些用户交互。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
onionshareonionshare < 2.5 -

II. Public POCs for CVE-2022-21688

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-21688

登录查看更多情报信息。

Same Patch Batch · onionshare · 2022-01-18 · 9 CVEs total

CVE-2022-216908.7 HIGHCross-Site Scripting in Onionshare
CVE-2022-216897.5 HIGHDenial of Service in Onionshare
CVE-2022-216936.3 MEDIUMPath traversal in Onionshare
CVE-2022-216914.3 MEDIUMImproper Access Control in Onionshare
CVE-2022-216924.3 MEDIUMImproper Access Control in Onionshare
CVE-2022-216954.3 MEDIUMImproper Access Control in Onionshare
CVE-2022-216964.3 MEDIUMUsername spoofing in OnionShare
CVE-2022-216943.7 LOWOTF-006: Broken Website Hardening Control: The CSP can be turned on or off but not configu

IV. Related Vulnerabilities

V. Comments for CVE-2022-21688

No comments yet


Leave a comment