CVE-2022-21691: Improper Access Control in Onionshare
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36462%
CWE
Published
1/21/2022
Updated
10/7/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
onionshare-cli | pip | >= 2.3, < 2.5 | 2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability reports and references do not contain specific code snippets, file paths, or function names that would allow confident identification of vulnerable functions. The technical description references client-side JavaScript modifications and server-side session handling issues, but:
- No actual code or commit diffs are provided in the advisory materials
- The GitHub release notes only mention general 'hardening improvements for session and username management'
- The CWE-306 classification suggests missing authentication in critical functions, but without code context we can't map this to specific functions
- The attack involves event emission patterns (connect/disconnect handling) rather than specific named functions While the vulnerability clearly exists in chat session management logic, the available public documentation lacks the implementation details needed to identify exact vulnerable functions with high confidence.