Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q97G-C29H-X2P7
HistoryMar 14, 2024 - 8:37 p.m.

Whoogle Search Path Traversal vulnerability

2024-03-1420:37:57
CWE-918
GitHub Advisory Database
github.com
16
whoogle search
path traversal
vulnerability
get requests
server-side.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

45.5%

Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the element method in app/routes.py does not validate the user-controlled src_type and element_url variables and passes them to the send method which sends a GET request on lines 339-343 in request.py, which leads to a server-side request forgery. This issue allows for crafting GET requests to internal and external resources on behalf of the server. For example, this issue would allow for accessing resources on the internal network that the server has access to, even though these resources may not be accessible on the internet. This issue is fixed in version 0.8.4.

Affected configurations

Vulners
Node
whoogle-search_projectwhoogle-searchRange00.8.4
VendorProductVersionCPE
whoogle-search_projectwhoogle-search*cpe:2.3:a:whoogle-search_project:whoogle-search:*:*:*:*:*:*:*:*

References

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

45.5%

Related for GHSA-Q97G-C29H-X2P7