-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
3077b85
commit 4da64ce
Showing
5 changed files
with
145 additions
and
189 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,3 +3,27 @@ | |
## Reporting a Vulnerability | ||
|
||
Please report security issues to [email protected] | ||
|
||
## Supported Versions | ||
|
||
To receive fixes for security vulnerabilities it is required to always upgrade to the latest version of Calibre-Web. See https://github.com/janeczku/calibre-web/releases/latest for the latest release. | ||
|
||
## History | ||
|
||
| Fixed in | Description |CVE number | | ||
| ---------- |---------|---------| | ||
| 3rd July 2018 | Guest access acts as a backdoor|| | ||
| V 0.6.7 |Hardcoded secret key for sessions |CVE-2020-12627 | | ||
| V 0.6.13|Calibre-Web Metadata cross site scripting |CVE-2021-25964| | ||
| V 0.6.13|Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo|| | ||
| V 0.6.13|JavaScript could get executed in the description field. Thanks to @ranjit-git || | ||
| V 0.6.13|JavaScript could get executed in a custom column of type "comment" field || | ||
| V 0.6.13|JavaScript could get executed after converting a book to another format with a title containing javascript code|| | ||
| V 0.6.13|JavaScript could get executed after converting a book to another format with a username containing javascript code|| | ||
| V 0.6.13|JavaScript could get executed in the description series, categories or publishers title|| | ||
| V 0.6.13|JavaScript could get executed in the shelf title|| | ||
| V 0.6.13|Login with the old session cookie after logout. Thanks to @ibarrionuevo|| | ||
| V 0.6.14|CSRF was possible. Thanks to @mik317 || | ||
| V 0.6.14|Cross-Site Scripting vulnerability on typeahead inputs. Thanks to @notdodo|| | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.