Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45153
HistoryJan 24, 2024 - 10:07 a.m.

Server Side Request Forgery (SSRF)

2024-01-2410:07:10
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9
whoogle_search
vulnerability
ssrf
window
element
request.py
routes.py
user-supplied data

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%

whoogle_search is vulnerable to Server Side Request Forgery (SSRF). The vulnerability is due to not sanitizing user-supplied data from the location variable in the window endpoint which passes the same user supplied input to send method within request.py. This can be exploited to send crafted GET requests to internal and external resources on behalf of the server leading to Server Side Request Forgery (SSRF). The same SSRF vulnerability also exists in the element method in app/routes.py which does not validate/sanitize user-controlled src_type and element_url variables.

CPENameOperatorVersion
whoogle-searchle0.8.3
whoogle-searchle0.8.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%

Related for VERACODE:45153