Username spoofing in OnionShare
Moderate severity
GitHub Reviewed
Published
Jan 18, 2022
in
onionshare/onionshare
•
Updated Oct 8, 2024
Description
Published by the National Vulnerability Database
Jan 18, 2022
Reviewed
Jan 19, 2022
Published to the GitHub Advisory Database
Jan 21, 2022
Last updated
Oct 8, 2024
Between September 26, 2021 and October 8, 2021, Radically Open Security conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's Red Team lab. This is an issue from that penetration test.
Description:
It is possible to change the username to that of another chat participant with an additional space character at the end of the name string.
Technical description:
Assumed users in Chat:
Alice
.Alice
.Alice
, which is hard to distinguish from theAlice
in the web interface.
Other (invisible) whitespace characters were found to be working as well.
Impact:
An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.
Recommendation:
References