Whoogle Search Path Traversal vulnerability
Moderate severity
GitHub Reviewed
Published
Mar 14, 2024
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Description
Published by the National Vulnerability Database
Jan 23, 2024
Published to the GitHub Advisory Database
Mar 14, 2024
Reviewed
Mar 14, 2024
Last updated
Mar 14, 2024
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limited file write vulnerability when the configuration options in Whoogle are enabled. The
configfunction inapp/routes.pydoes not validate the user-controllednamevariable on line 447 andconfig_datavariable on line 437. Thenamevariable is insecurely concatenated inos.path.join, leading to path manipulation. The POST data from theconfig_datavariable is saved withpickle.dumpwhich leads to a limited file write. However, the data that is saved is earlier transformed into a dictionary and theurlkey value pair is added before the file is saved on the system. All in all, the issue allows us to save and overwrite files on the system that the application has permissions to, with a dictionary containing arbitrary data and theurlkey value, which is a limited file write. Version 0.8.4 contains a patch for this issue.References