Safety vulnerability ID: 50116
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Whoogle-search 0.7.2 includes a fix for CVE-2022-25303: Cross-site Scripting (XSS) via the query string parameter q. error_message() is rendered using the | safe filter, meaning the user input is not escaped.
Latest version: 0.9.1
Self-hosted, ad-free, privacy-respecting metasearch engine
The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinja.palletsprojects.com/en/3.1.x/templates/working-with-automatic-escaping), meaning the user input is not escaped. See CVE-2022-25303.
MISC:https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448: https://github.com/benbusby/whoogle-search/blob/6d362ca5c7a00d2f691a2512461c5dfbfc01cbb3/app/routes.py%23L448
MISC:https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606: https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606
MISC:https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306: https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application