Lucene search

K
BenbusbyWhoogle Search

5 matches found

CVE
CVE
added 2024/01/23 6:15 p.m.200 views

CVE-2024-22205

Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the window endpoint does not sanitize user-supplied input from the location variable and passes it to the send method which sends a GET request on lines 339-343 in request.py, which leads to a server-side request forger...

9.8CVSS9.1AI score0.00297EPSS
CVE
CVE
added 2024/01/23 6:15 p.m.191 views

CVE-2024-22417

Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the element method in app/routes.py does not validate the user-controlled src_type and element_url variables and passes them to the send method which sends a GET request on lines 339-343 in requests.py. The returned con...

6.1CVSS5.9AI score0.00358EPSS
CVE
CVE
added 2024/01/23 6:15 p.m.43 views

CVE-2024-22204

Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limited file write vulnerability when the configuration options in Whoogle are enabled. The config function in app/routes.py does not validate the user-controlled name variable on line 447 and config_data variable on...

5.3CVSS5.2AI score0.002EPSS
CVE
CVE
added 2025/04/16 6:16 p.m.39 views

CVE-2024-53305

An issue in the component /models/config.py of Whoogle search v0.9.0 allows attackers to execute arbitrary code via supplying a crafted search query.

7.3CVSS7.4AI score0.00128EPSS
CVE
CVE
added 2024/01/23 6:15 p.m.25 views

CVE-2024-22203

Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the element method in app/routes.py does not validate the user-controlled src_type and element_url variables and passes them to the send method which sends a GET request on lines 339-343 in request.py, which leads to a s...

9.8CVSS9.1AI score0.00441EPSS