Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mxvc-fwgx-j778

Опубликовано: 15 июл. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.4

Описание

Whoogle Search Cross-site Scripting via string parameter

The package whoogle-search before version 0.7.2 is vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the flask.render_template function. However, the error_message is rendered using the | safe filter, meaning the user input is not escaped.

Пакеты

Наименование

whoogle-search

pip
Затронутые версииВерсия исправления

< 0.7.2

0.7.2

EPSS

Процентиль: 53%
0.00301
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.4
nvd
больше 3 лет назад

The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinja.palletsprojects.com/en/3.1.x/templates/working-with-automatic-escaping), meaning the user input is not escaped.

EPSS

Процентиль: 53%
0.00301
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79