Skip to main content

CVE-2022-21689: CWE-400: Uncontrolled Resource Consumption in onionshare onionshare

Medium
Published: Tue Jan 18 2022 (01/18/2022, 22:10:10 UTC)
Source: CVE
Vendor/Project: onionshare
Product: onionshare

Description

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.

AI-Powered Analysis

AILast updated: 06/23/2025, 18:17:51 UTC

Technical Analysis

CVE-2022-21689 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, found in OnionShare versions prior to 2.5. OnionShare is an open-source application that enables secure and anonymous file sharing, website hosting, and chat over the Tor network. The vulnerability specifically affects the receive mode of OnionShare, which limits concurrent uploads to 100 per second. An attacker can exploit this by using a simple script to trigger the upload limit repeatedly within the same second, effectively blocking other users from uploading files. This denial-of-service (DoS) condition arises because the application enforces a strict cap on concurrent uploads per second and does not differentiate between legitimate and malicious upload attempts. Due to the anonymity and privacy features inherent in the Tor network, mitigating this attack in public mode is challenging, as it is difficult to identify or block malicious actors without compromising anonymity. The vulnerability does not require authentication, as it can be triggered by any user with access to the receive mode endpoint. No known exploits have been reported in the wild, and no official patches were linked in the provided information, although the issue is addressed in versions 2.5 and later. The attack impacts availability by preventing legitimate users from uploading files, but it does not directly compromise confidentiality or integrity of data. The scope is limited to OnionShare users operating in receive mode, particularly those using versions earlier than 2.5.

Potential Impact

For European organizations using OnionShare, especially those relying on it for secure and anonymous file sharing or communication, this vulnerability could disrupt critical workflows by denying service to legitimate users. Organizations in sectors such as journalism, human rights advocacy, and secure communications—where OnionShare is popular due to its privacy features—may experience operational delays or interruptions. The inability to upload files could hinder information exchange and collaboration, particularly in sensitive environments requiring anonymity. While the vulnerability does not lead to data breaches or unauthorized data modification, the denial-of-service aspect could degrade trust in the tool and force users to seek less secure alternatives. Additionally, the anonymity of the Tor network complicates detection and mitigation, potentially allowing persistent attackers to cause prolonged service disruption. The impact is more pronounced for organizations that depend on OnionShare for time-sensitive or critical data transfers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should upgrade OnionShare to version 2.5 or later, where this issue is addressed. Since no patch links were provided, users should verify the latest official releases from the OnionShare project. In environments where upgrading is not immediately possible, organizations can implement rate limiting or connection throttling at the network level to restrict the number of concurrent upload attempts from individual IP addresses, although this may be less effective due to Tor's anonymity. Monitoring network traffic patterns for unusual spikes in upload requests can help detect potential abuse. Deploying additional application-layer protections, such as CAPTCHA challenges or requiring authentication in private modes, can reduce the risk of automated abuse, though these may not be feasible in public anonymous modes. Finally, organizations should educate users about this limitation and encourage the use of updated software versions to maintain service availability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf22df

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 6:17:51 PM

Last updated: 8/1/2025, 4:29:32 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats