Lucene search

K
cveGitHub_MCVE-2024-22417
HistoryJan 23, 2024 - 6:15 p.m.

CVE-2024-22417

2024-01-2318:15:18
CWE-79
GitHub_M
web.nvd.nist.gov
139
cve
2024
22417
whoogle search
cross-site scripting
security vulnerability
patch

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

34.4%

Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the element method in app/routes.py does not validate the user-controlled src_type and element_url variables and passes them to the send method which sends a GET request on lines 339-343 in requests.py. The returned contents of the URL are then passed to and reflected back to the user in the send_file function on line 484, together with the user-controlled src_type, which allows the attacker to control the HTTP response content type leading to a cross-site scripting vulnerability. An attacker could craft a special URL to point to a malicious website and send the link to a victim. The fact that the link would contain a trusted domain (e.g. from one of public Whoogle instances) could be used to trick the user into clicking the link. The malicious website could, for example, be a copy of a real website, meant to steal a person’s credentials to the website, or trick that person in another way. Version 0.8.4 contains a patch for this issue.

Affected configurations

Nvd
Vulners
Node
benbusbywhoogle_searchRange<0.8.4
VendorProductVersionCPE
benbusbywhoogle_search*cpe:2.3:a:benbusby:whoogle_search:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "benbusby",
    "product": "whoogle-search",
    "versions": [
      {
        "version": "< 0.8.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

34.4%

Related for CVE-2024-22417