Описание
The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the flask.render_template function. However, the error_message is rendered using the | safe filter, meaning the user input is not escaped.
Ссылки
- Broken Link
- PatchThird Party Advisory
- Third Party Advisory
- Broken Link
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.7.2 (исключая)
cpe:2.3:a:whoogle-search_project:whoogle-search:*:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00301
Низкий
5.4 Medium
CVSS3
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.4
github
больше 3 лет назад
Whoogle Search Cross-site Scripting via string parameter
EPSS
Процентиль: 53%
0.00301
Низкий
5.4 Medium
CVSS3
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79