Skip to content

Commit d3233b4

Browse files
committed
Prepare release
1 parent c4fad3c commit d3233b4

File tree

56 files changed

+7779
-6562
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+7779
-6562
lines changed

SECURITY.md

+40-35
Original file line numberDiff line numberDiff line change
@@ -10,41 +10,46 @@ To receive fixes for security vulnerabilities it is required to always upgrade t
1010

1111
## History
1212

13-
| Fixed in | Description |CVE number |
14-
|---------------|--------------------------------------------------------------------------------------------------------------------|---------|
15-
| 3rd July 2018 | Guest access acts as a backdoor ||
16-
| V 0.6.7 | Hardcoded secret key for sessions |CVE-2020-12627 |
17-
| V 0.6.13 | Calibre-Web Metadata cross site scripting |CVE-2021-25964|
18-
| V 0.6.13 | Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo ||
19-
| V 0.6.13 | JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource) ||
20-
| V 0.6.13 | JavaScript could get executed in a custom column of type "comment" field ||
21-
| V 0.6.13 | JavaScript could get executed after converting a book to another format with a title containing javascript code ||
22-
| V 0.6.13 | JavaScript could get executed after converting a book to another format with a username containing javascript code ||
23-
| V 0.6.13 | JavaScript could get executed in the description series, categories or publishers title ||
24-
| V 0.6.13 | JavaScript could get executed in the shelf title ||
25-
| V 0.6.13 | Login with the old session cookie after logout. Thanks to @ibarrionuevo ||
26-
| V 0.6.14 | CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) |CVE-2021-25965|
27-
| V 0.6.14 | Migrated some routes to POST-requests (CSRF protection). Thanks to @scara31 |CVE-2021-4164|
28-
| V 0.6.15 | Fix for "javascript:" script links in identifier. Thanks to @scara31 |CVE-2021-4170|
29-
| V 0.6.15 | Cross-Site Scripting vulnerability on uploaded cover file names. Thanks to @ibarrionuevo ||
30-
| V 0.6.15 | Creating public shelfs is now denied if user is missing the edit public shelf right. Thanks to @ibarrionuevo ||
31-
| V 0.6.15 | Changed error message in case of trying to delete a shelf unauthorized. Thanks to @ibarrionuevo ||
32-
| V 0.6.16 | JavaScript could get executed on authors page. Thanks to @alicaz |CVE-2022-0352|
33-
| V 0.6.16 | Localhost can no longer be used to upload covers. Thanks to @scara31 |CVE-2022-0339|
34-
| V 0.6.16 | Another case where public shelfs could be created without permission is prevented. Thanks to @nhiephon |CVE-2022-0273|
35-
| V 0.6.16 | It's prevented to get the name of a private shelfs. Thanks to @nhiephon |CVE-2022-0405|
36-
| V 0.6.17 | The SSRF Protection can no longer be bypassed via an HTTP redirect. Thanks to @416e6e61 |CVE-2022-0767|
37-
| V 0.6.17 | The SSRF Protection can no longer be bypassed via 0.0.0.0 and it's ipv6 equivalent. Thanks to @r0hanSH |CVE-2022-0766|
38-
| V 0.6.18 | Possible SQL Injection is prevented in user table Thanks to Iman Sharafaldin (Forward Security) |CVE-2022-30765|
39-
| V 0.6.18 | The SSRF protection no longer can be bypassed by IPV6/IPV4 embedding. Thanks to @416e6e61 |CVE-2022-0939|
40-
| V 0.6.18 | The SSRF protection no longer can be bypassed to connect to other servers in the local network. Thanks to @michaellrowley |CVE-2022-0990|
41-
| V 0.6.20 | Credentials for emails are now stored encrypted ||
42-
| V 0.6.20 | Login is rate limited ||
43-
| V 0.6.20 | Passwordstrength can be forced ||
44-
| V 0.6.21 | SMTP server credentials are no longer returned to client ||
45-
| V 0.6.21 | Cross-site scripting (XSS) stored in href bypasses filter using data wrapper no longer possible ||
46-
| V 0.6.21 | Cross-site scripting (XSS) is no longer possible via pathchooser ||
47-
| V 0.6.21 | Error Handling at non existent rating, language, and user downloaded books was fixed ||
13+
| Fixed in | Description |CVE number |
14+
|---------------|--------------------------------------------------------------------------------------------------------------------------------|---------|
15+
| 3rd July 2018 | Guest access acts as a backdoor ||
16+
| V 0.6.7 | Hardcoded secret key for sessions |CVE-2020-12627 |
17+
| V 0.6.13 | Calibre-Web Metadata cross site scripting |CVE-2021-25964|
18+
| V 0.6.13 | Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo ||
19+
| V 0.6.13 | JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource) ||
20+
| V 0.6.13 | JavaScript could get executed in a custom column of type "comment" field ||
21+
| V 0.6.13 | JavaScript could get executed after converting a book to another format with a title containing javascript code ||
22+
| V 0.6.13 | JavaScript could get executed after converting a book to another format with a username containing javascript code ||
23+
| V 0.6.13 | JavaScript could get executed in the description series, categories or publishers title ||
24+
| V 0.6.13 | JavaScript could get executed in the shelf title ||
25+
| V 0.6.13 | Login with the old session cookie after logout. Thanks to @ibarrionuevo ||
26+
| V 0.6.14 | CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) |CVE-2021-25965|
27+
| V 0.6.14 | Migrated some routes to POST-requests (CSRF protection). Thanks to @scara31 |CVE-2021-4164|
28+
| V 0.6.15 | Fix for "javascript:" script links in identifier. Thanks to @scara31 |CVE-2021-4170|
29+
| V 0.6.15 | Cross-Site Scripting vulnerability on uploaded cover file names. Thanks to @ibarrionuevo ||
30+
| V 0.6.15 | Creating public shelfs is now denied if user is missing the edit public shelf right. Thanks to @ibarrionuevo ||
31+
| V 0.6.15 | Changed error message in case of trying to delete a shelf unauthorized. Thanks to @ibarrionuevo ||
32+
| V 0.6.16 | JavaScript could get executed on authors page. Thanks to @alicaz |CVE-2022-0352|
33+
| V 0.6.16 | Localhost can no longer be used to upload covers. Thanks to @scara31 |CVE-2022-0339|
34+
| V 0.6.16 | Another case where public shelfs could be created without permission is prevented. Thanks to @nhiephon |CVE-2022-0273|
35+
| V 0.6.16 | It's prevented to get the name of a private shelfs. Thanks to @nhiephon |CVE-2022-0405|
36+
| V 0.6.17 | The SSRF Protection can no longer be bypassed via an HTTP redirect. Thanks to @416e6e61 |CVE-2022-0767|
37+
| V 0.6.17 | The SSRF Protection can no longer be bypassed via 0.0.0.0 and it's ipv6 equivalent. Thanks to @r0hanSH |CVE-2022-0766|
38+
| V 0.6.18 | Possible SQL Injection is prevented in user table Thanks to Iman Sharafaldin (Forward Security) |CVE-2022-30765|
39+
| V 0.6.18 | The SSRF protection no longer can be bypassed by IPV6/IPV4 embedding. Thanks to @416e6e61 |CVE-2022-0939|
40+
| V 0.6.18 | The SSRF protection no longer can be bypassed to connect to other servers in the local network. Thanks to @michaellrowley |CVE-2022-0990|
41+
| V 0.6.20 | Credentials for emails are now stored encrypted ||
42+
| V 0.6.20 | Login is rate limited ||
43+
| V 0.6.20 | Passwordstrength can be forced ||
44+
| V 0.6.21 | SMTP server credentials are no longer returned to client ||
45+
| V 0.6.21 | Cross-site scripting (XSS) stored in href bypasses filter using data wrapper no longer possible ||
46+
| V 0.6.21 | Cross-site scripting (XSS) is no longer possible via pathchooser ||
47+
| V 0.6.21 | Error Handling at non existent rating, language, and user downloaded books was fixed ||
48+
| V 0.6.22 | Upload mimetype is checked to prevent malicious file content in the books library ||
49+
| V 0.6.22 | Cross-site scripting (XSS) stored in comments section is prevented better (switching from lxml to bleach for sanitizing strings) ||
50+
| V 0.6.23 | Cookies are no longer stored for opds basic authentication and proxy authentication ||
51+
52+
4853

4954

5055
## Statement regarding Log4j (CVE-2021-44228 and related)

cps/constants.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ def selected_roles(dictionary):
175175
'series_id, languages, publisher, pubdate, identifiers')
176176

177177
# python build process likes to have x.y.zbw -> b for beta and w a counting number
178-
STABLE_VERSION = {'version': '0.6.23b'}
178+
STABLE_VERSION = {'version': '0.6.23'}
179179

180180
NIGHTLY_VERSION = dict()
181181
NIGHTLY_VERSION[0] = '$Format:%H$'
0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)