Miggo Logo

CVE-2022-21691: Improper Access Control in Onionshare

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.36462%
Published
1/21/2022
Updated
10/7/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
onionshare-clipip>= 2.3, < 2.52.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability reports and references do not contain specific code snippets, file paths, or function names that would allow confident identification of vulnerable functions. The technical description references client-side JavaScript modifications and server-side session handling issues, but:

  1. No actual code or commit diffs are provided in the advisory materials
  2. The GitHub release notes only mention general 'hardening improvements for session and username management'
  3. The CWE-306 classification suggests missing authentication in critical functions, but without code context we can't map this to specific functions
  4. The attack involves event emission patterns (connect/disconnect handling) rather than specific named functions While the vulnerability clearly exists in chat session management logic, the available public documentation lacks the implementation details needed to identify exact vulnerable functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**tw**n S*pt*m**r **, **** *n* O*to**r *, ****, [R**i**lly Op*n S**urity](*ttps://www.r**i**llyop*ns**urity.*om/) *on*u*t** * p*n*tr*tion t*st o* OnionS**r* *.*, *un*** *y t** Op*n T***nolo*y *un*'s [R** T**m l**](*ttps://www.op*nt***.*un*/l**s/r**-t

Reasoning

T** provi*** vuln*r**ility r*ports *n* r***r*n**s *o not *ont*in sp**i*i* *o** snipp*ts, *il* p*t*s, or *un*tion n*m*s t**t woul* *llow *on*i**nt i**nti*i**tion o* vuln*r**l* *un*tions. T** t***ni**l **s*ription r***r*n**s *li*nt-si** J*v*S*ript mo*i