Whoogle Search Cross-site Scripting via string parameter
Moderate severity
GitHub Reviewed
Published
Jul 15, 2022
to the GitHub Advisory Database
•
Updated Aug 17, 2023
Description
Published by the National Vulnerability Database
Jul 12, 2022
Published to the GitHub Advisory Database
Jul 15, 2022
Reviewed
Jul 15, 2022
Last updated
Aug 17, 2023
The package whoogle-search before version 0.7.2 is vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the flask.render_template function. However, the error_message is rendered using the | safe filter, meaning the user input is not escaped.
References