{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-21690","title":"Title"},{"category":"description","text":"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-21690","url":"https://www.suse.com/security/cve/CVE-2022-21690"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1194866 for CVE-2022-21690","url":"https://bugzilla.suse.com/1194866"}],"title":"SUSE CVE CVE-2022-21690","tracking":{"current_release_date":"2025-03-15T07:49:45Z","generator":{"date":"2023-02-15T03:29:08Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-21690","initial_release_date":"2023-02-15T03:29:08Z","revision_history":[{"date":"2023-02-15T03:29:08Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:17:29Z","number":"3","summary":"Current version"},{"date":"2025-02-15T03:57:15Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:44:57Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:49:45Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"python-onionshare-2.5-1.1","product":{"name":"python-onionshare-2.5-1.1","product_id":"python-onionshare-2.5-1.1","product_identification_helper":{"cpe":"cpe:2.3:a:onionshare:onionshare:2.5:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/python-onionshare@2.5-1.1"}}},{"category":"product_version","name":"python3-onionshare-2.6-4.1","product":{"name":"python3-onionshare-2.6-4.1","product_id":"python3-onionshare-2.6-4.1","product_identification_helper":{"cpe":"cpe:2.3:a:onionshare:onionshare:2.6:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/python3-onionshare@2.6-4.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python-onionshare-2.5-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python-onionshare-2.5-1.1"},"product_reference":"python-onionshare-2.5-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"python3-onionshare-2.6-4.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python3-onionshare-2.6-4.1"},"product_reference":"python3-onionshare-2.6-4.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2022-21690","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-21690"}],"notes":[{"category":"general","text":"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]},"references":[{"category":"external","summary":"CVE-2022-21690","url":"https://www.suse.com/security/cve/CVE-2022-21690"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1194866 for CVE-2022-21690","url":"https://bugzilla.suse.com/1194866"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]}],"scores":[{"cvss_v3":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]}],"threats":[{"category":"impact","date":"2022-01-18T22:00:34Z","details":"important"}],"title":"CVE-2022-21690"}]}