mirror of
https://github.com/JonathanHerrewijnen/calibre-web.git
synced 2024-11-14 15:14:07 +00:00
1.6 KiB
1.6 KiB
Security Policy
Reporting a Vulnerability
Please report security issues to ozzie.fernandez.isaacs@googlemail.com
Supported Versions
To receive fixes for security vulnerabilities it is required to always upgrade to the latest version of Calibre-Web. See https://github.com/janeczku/calibre-web/releases/latest for the latest release.
History
Fixed in | Description | CVE number |
---|---|---|
3rd July 2018 | Guest access acts as a backdoor | |
V 0.6.7 | Hardcoded secret key for sessions | CVE-2020-12627 |
V 0.6.13 | Calibre-Web Metadata cross site scripting | CVE-2021-25964 |
V 0.6.13 | Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo | |
V 0.6.13 | JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource) | |
V 0.6.13 | JavaScript could get executed in a custom column of type "comment" field | |
V 0.6.13 | JavaScript could get executed after converting a book to another format with a title containing javascript code | |
V 0.6.13 | JavaScript could get executed after converting a book to another format with a username containing javascript code | |
V 0.6.13 | JavaScript could get executed in the description series, categories or publishers title | |
V 0.6.13 | JavaScript could get executed in the shelf title | |
V 0.6.13 | Login with the old session cookie after logout. Thanks to @ibarrionuevo | |
V 0.6.14 | CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) | CVE-2021-25965 |
V 0.6.14 | Cross-Site Scripting vulnerability on typeahead inputs. Thanks to @notdodo |