mirror of
https://github.com/janeczku/calibre-web
synced 2024-12-24 00:50:30 +00:00
30 lines
1.6 KiB
Markdown
30 lines
1.6 KiB
Markdown
# Security Policy
|
|
|
|
## Reporting a Vulnerability
|
|
|
|
Please report security issues to ozzie.fernandez.isaacs@googlemail.com
|
|
|
|
## Supported Versions
|
|
|
|
To receive fixes for security vulnerabilities it is required to always upgrade to the latest version of Calibre-Web. See https://github.com/janeczku/calibre-web/releases/latest for the latest release.
|
|
|
|
## History
|
|
|
|
| Fixed in | Description |CVE number |
|
|
| ---------- |---------|---------|
|
|
| 3rd July 2018 | Guest access acts as a backdoor||
|
|
| V 0.6.7 |Hardcoded secret key for sessions |CVE-2020-12627 |
|
|
| V 0.6.13|Calibre-Web Metadata cross site scripting |CVE-2021-25964|
|
|
| V 0.6.13|Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo||
|
|
| V 0.6.13|JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource)||
|
|
| V 0.6.13|JavaScript could get executed in a custom column of type "comment" field ||
|
|
| V 0.6.13|JavaScript could get executed after converting a book to another format with a title containing javascript code||
|
|
| V 0.6.13|JavaScript could get executed after converting a book to another format with a username containing javascript code||
|
|
| V 0.6.13|JavaScript could get executed in the description series, categories or publishers title||
|
|
| V 0.6.13|JavaScript could get executed in the shelf title||
|
|
| V 0.6.13|Login with the old session cookie after logout. Thanks to @ibarrionuevo||
|
|
| V 0.6.14|CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) |CVE-2021-25965|
|
|
| V 0.6.14|Cross-Site Scripting vulnerability on typeahead inputs. Thanks to @notdodo||
|
|
|
|
|