An issue in the component /models/config.py of Whoogle search v0.9.0 allows attackers to execute arbitrary code via supplying a crafted search query.
References
Configurations
History
24 Jun 2025, 15:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:benbusby:whoogle_search:0.9.0:*:*:*:*:*:*:* | |
First Time |
Benbusby
Benbusby whoogle Search |
|
Summary |
|
|
References | () https://gist.github.com/fern89/ca5fe76ad81b4bc363e7341e523a1651 - Exploit | |
References | () https://github.com/benbusby/whoogle-search/commit/223f00c3c0533423114f99b30c561278bc0b42ba - Patch |
16 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
CWE | CWE-77 |
16 Apr 2025, 18:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 18:16
Updated : 2025-06-24 15:01
NVD link : CVE-2024-53305
Mitre link : CVE-2024-53305
CVE.ORG link : CVE-2024-53305
JSON object : View
Products Affected
benbusby
- whoogle_search
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')