The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinja.palletsprojects.com/en/3.1.x/templates/working-with-automatic-escaping), meaning the user input is not escaped.
References
Link | Resource |
---|---|
https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448 | Broken Link |
https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 | Third Party Advisory |
https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448 | Broken Link |
https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448 - Broken Link | |
References | () https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.4 |
19 Jul 2022, 12:45
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606 - Patch, Third Party Advisory | |
References | (MISC) https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306 - Third Party Advisory | |
References | (MISC) https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448 - Broken Link | |
CPE | cpe:2.3:a:whoogle-search_project:whoogle-search:*:*:*:*:*:*:*:* | |
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
12 Jul 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-12 15:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25303
Mitre link : CVE-2022-25303
CVE.ORG link : CVE-2022-25303
JSON object : View
Products Affected
whoogle-search_project
- whoogle-search
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')