We found results for “”
CVE-2024-22417
Good to know:
Date: January 23, 2024
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the "element" method in "app/routes.py" does not validate the user-controlled "src_type" and "element_url" variables and passes them to the "send" method which sends a "GET" request on lines 339-343 in "requests.py". The returned contents of the URL are then passed to and reflected back to the user in the "send_file" function on line 484, together with the user-controlled "src_type", which allows the attacker to control the HTTP response content type leading to a cross-site scripting vulnerability. An attacker could craft a special URL to point to a malicious website and send the link to a victim. The fact that the link would contain a trusted domain (e.g. from one of public Whoogle instances) could be used to trick the user into clicking the link. The malicious website could, for example, be a copy of a real website, meant to steal a person’s credentials to the website, or trick that person in another way. Version 0.8.4 contains a patch for this issue.
Language: Python
Severity Score
Related Resources (13)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


