PyPi: Whoogle-Search

CVE-2022-25303

Safety vulnerability ID: 50116

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 12, 2022 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Whoogle-search 0.7.2 includes a fix for CVE-2022-25303: Cross-site Scripting (XSS) via the query string parameter q. error_message() is rendered using the | safe filter, meaning the user input is not escaped.

Affected package

whoogle-search

Latest version: 0.9.1

Self-hosted, ad-free, privacy-respecting metasearch engine

Affected versions

Fixed versions

Vulnerability changelog

The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinja.palletsprojects.com/en/3.1.x/templates/working-with-automatic-escaping), meaning the user input is not escaped. See CVE-2022-25303.


MISC:https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448: https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448
MISC:https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606: https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606
MISC:https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306: https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE