CVE-2022-21696

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-21696
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21696.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-21696
Aliases
Downstream
Related
Published
2022-01-18T19:55:10Z
Modified
2025-10-20T19:34:19Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Username spoofing in OnionShare
Details

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.

Database specific
{
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

Git / github.com/onionshare/onionshare

Affected ranges

Type
GIT
Repo
https://github.com/onionshare/onionshare
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed