Whoogle Search Path Traversal vulnerability
Moderate severity
GitHub Reviewed
Published
Mar 14, 2024
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Description
Published by the National Vulnerability Database
Jan 23, 2024
Published to the GitHub Advisory Database
Mar 14, 2024
Reviewed
Mar 14, 2024
Last updated
Mar 14, 2024
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limited file write vulnerability when the configuration options in Whoogle are enabled. The
config
function inapp/routes.py
does not validate the user-controlledname
variable on line 447 andconfig_data
variable on line 437. Thename
variable is insecurely concatenated inos.path.join
, leading to path manipulation. The POST data from theconfig_data
variable is saved withpickle.dump
which leads to a limited file write. However, the data that is saved is earlier transformed into a dictionary and theurl
key value pair is added before the file is saved on the system. All in all, the issue allows us to save and overwrite files on the system that the application has permissions to, with a dictionary containing arbitrary data and theurl
key value, which is a limited file write. Version 0.8.4 contains a patch for this issue.References