Kiwix Server 'pattern' Parameter Cross-Site Scripting Vulnerability

Summary
The host is installed with Kiwix and is prone to xss vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site. Impact Level: Application
Solution
Apply the patch manually from the given link, http://sourceforge.net/p/kiwix/kiwix/ci/d1af5f0375c6db24d4071acf4806735725fd206e
Insight
Input passed via the 'pattern' parameter to '/search' is not properly sanitised before being returned to the user.
Affected
Kiwix version 0.9 and prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References