Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-21689: CWE-400: Uncontrolled Resource Consumption in onionshare onionshare

0
Medium
Published: Tue Jan 18 2022 (01/18/2022, 22:10:10 UTC)
Source: CVE
Vendor/Project: onionshare
Product: onionshare

Description

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.

AI-Powered Analysis

AILast updated: 06/23/2025, 18:17:51 UTC

Technical Analysis

CVE-2022-21689 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, found in OnionShare versions prior to 2.5. OnionShare is an open-source application that enables secure and anonymous file sharing, website hosting, and chat over the Tor network. The vulnerability specifically affects the receive mode of OnionShare, which limits concurrent uploads to 100 per second. An attacker can exploit this by using a simple script to trigger the upload limit repeatedly within the same second, effectively blocking other users from uploading files. This denial-of-service (DoS) condition arises because the application enforces a strict cap on concurrent uploads per second and does not differentiate between legitimate and malicious upload attempts. Due to the anonymity and privacy features inherent in the Tor network, mitigating this attack in public mode is challenging, as it is difficult to identify or block malicious actors without compromising anonymity. The vulnerability does not require authentication, as it can be triggered by any user with access to the receive mode endpoint. No known exploits have been reported in the wild, and no official patches were linked in the provided information, although the issue is addressed in versions 2.5 and later. The attack impacts availability by preventing legitimate users from uploading files, but it does not directly compromise confidentiality or integrity of data. The scope is limited to OnionShare users operating in receive mode, particularly those using versions earlier than 2.5.

Potential Impact

For European organizations using OnionShare, especially those relying on it for secure and anonymous file sharing or communication, this vulnerability could disrupt critical workflows by denying service to legitimate users. Organizations in sectors such as journalism, human rights advocacy, and secure communications—where OnionShare is popular due to its privacy features—may experience operational delays or interruptions. The inability to upload files could hinder information exchange and collaboration, particularly in sensitive environments requiring anonymity. While the vulnerability does not lead to data breaches or unauthorized data modification, the denial-of-service aspect could degrade trust in the tool and force users to seek less secure alternatives. Additionally, the anonymity of the Tor network complicates detection and mitigation, potentially allowing persistent attackers to cause prolonged service disruption. The impact is more pronounced for organizations that depend on OnionShare for time-sensitive or critical data transfers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should upgrade OnionShare to version 2.5 or later, where this issue is addressed. Since no patch links were provided, users should verify the latest official releases from the OnionShare project. In environments where upgrading is not immediately possible, organizations can implement rate limiting or connection throttling at the network level to restrict the number of concurrent upload attempts from individual IP addresses, although this may be less effective due to Tor's anonymity. Monitoring network traffic patterns for unusual spikes in upload requests can help detect potential abuse. Deploying additional application-layer protections, such as CAPTCHA challenges or requiring authentication in private modes, can reduce the risk of automated abuse, though these may not be feasible in public anonymous modes. Finally, organizations should educate users about this limitation and encourage the use of updated software versions to maintain service availability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf22df

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 6:17:51 PM

Last updated: 2/7/2026, 7:59:05 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats