calibre-web/SECURITY.md

1.6 KiB

Security Policy

Reporting a Vulnerability

Please report security issues to ozzie.fernandez.isaacs@googlemail.com

Supported Versions

To receive fixes for security vulnerabilities it is required to always upgrade to the latest version of Calibre-Web. See https://github.com/janeczku/calibre-web/releases/latest for the latest release.

History

Fixed in Description CVE number
3rd July 2018 Guest access acts as a backdoor
V 0.6.7 Hardcoded secret key for sessions CVE-2020-12627
V 0.6.13 Calibre-Web Metadata cross site scripting CVE-2021-25964
V 0.6.13 Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo
V 0.6.13 JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource)
V 0.6.13 JavaScript could get executed in a custom column of type "comment" field
V 0.6.13 JavaScript could get executed after converting a book to another format with a title containing javascript code
V 0.6.13 JavaScript could get executed after converting a book to another format with a username containing javascript code
V 0.6.13 JavaScript could get executed in the description series, categories or publishers title
V 0.6.13 JavaScript could get executed in the shelf title
V 0.6.13 Login with the old session cookie after logout. Thanks to @ibarrionuevo
V 0.6.14 CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) CVE-2021-25965
V 0.6.14 Cross-Site Scripting vulnerability on typeahead inputs. Thanks to @notdodo