{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-21693","title":"Title"},{"category":"description","text":"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-21693","url":"https://www.suse.com/security/cve/CVE-2022-21693"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1194866 for CVE-2022-21693","url":"https://bugzilla.suse.com/1194866"}],"title":"SUSE CVE CVE-2022-21693","tracking":{"current_release_date":"2025-03-15T07:49:40Z","generator":{"date":"2023-02-15T03:29:08Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-21693","initial_release_date":"2023-02-15T03:29:08Z","revision_history":[{"date":"2023-02-15T03:29:08Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:17:25Z","number":"3","summary":"Current version"},{"date":"2025-02-14T08:02:18Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:44:53Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:49:40Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"python-onionshare-2.5-1.1","product":{"name":"python-onionshare-2.5-1.1","product_id":"python-onionshare-2.5-1.1","product_identification_helper":{"cpe":"cpe:2.3:a:onionshare:onionshare:2.5:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/python-onionshare@2.5-1.1"}}},{"category":"product_version","name":"python3-onionshare-2.6-4.1","product":{"name":"python3-onionshare-2.6-4.1","product_id":"python3-onionshare-2.6-4.1","product_identification_helper":{"cpe":"cpe:2.3:a:onionshare:onionshare:2.6:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/python3-onionshare@2.6-4.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python-onionshare-2.5-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python-onionshare-2.5-1.1"},"product_reference":"python-onionshare-2.5-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"python3-onionshare-2.6-4.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python3-onionshare-2.6-4.1"},"product_reference":"python3-onionshare-2.6-4.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2022-21693","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-21693"}],"notes":[{"category":"general","text":"OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]},"references":[{"category":"external","summary":"CVE-2022-21693","url":"https://www.suse.com/security/cve/CVE-2022-21693"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1194866 for CVE-2022-21693","url":"https://bugzilla.suse.com/1194866"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:python-onionshare-2.5-1.1","openSUSE Tumbleweed:python3-onionshare-2.6-4.1"]}],"threats":[{"category":"impact","date":"2022-01-18T22:00:34Z","details":"important"}],"title":"CVE-2022-21693"}]}