@@ -10,41 +10,46 @@ To receive fixes for security vulnerabilities it is required to always upgrade t
10
10
11
11
## History
12
12
13
- | Fixed in | Description | CVE number |
14
- | ---------------| --------------------------------------------------------------------------------------------------------------------| ---------|
15
- | 3rd July 2018 | Guest access acts as a backdoor ||
16
- | V 0.6.7 | Hardcoded secret key for sessions | CVE-2020 -12627 |
17
- | V 0.6.13 | Calibre-Web Metadata cross site scripting | CVE-2021 -25964|
18
- | V 0.6.13 | Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo ||
19
- | V 0.6.13 | JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource) ||
20
- | V 0.6.13 | JavaScript could get executed in a custom column of type "comment" field ||
21
- | V 0.6.13 | JavaScript could get executed after converting a book to another format with a title containing javascript code ||
22
- | V 0.6.13 | JavaScript could get executed after converting a book to another format with a username containing javascript code ||
23
- | V 0.6.13 | JavaScript could get executed in the description series, categories or publishers title ||
24
- | V 0.6.13 | JavaScript could get executed in the shelf title ||
25
- | V 0.6.13 | Login with the old session cookie after logout. Thanks to @ibarrionuevo ||
26
- | V 0.6.14 | CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) | CVE-2021 -25965|
27
- | V 0.6.14 | Migrated some routes to POST-requests (CSRF protection). Thanks to @scara31 | CVE-2021 -4164|
28
- | V 0.6.15 | Fix for "javascript:" script links in identifier. Thanks to @scara31 | CVE-2021 -4170|
29
- | V 0.6.15 | Cross-Site Scripting vulnerability on uploaded cover file names. Thanks to @ibarrionuevo ||
30
- | V 0.6.15 | Creating public shelfs is now denied if user is missing the edit public shelf right. Thanks to @ibarrionuevo ||
31
- | V 0.6.15 | Changed error message in case of trying to delete a shelf unauthorized. Thanks to @ibarrionuevo ||
32
- | V 0.6.16 | JavaScript could get executed on authors page. Thanks to @alicaz | CVE-2022 -0352|
33
- | V 0.6.16 | Localhost can no longer be used to upload covers. Thanks to @scara31 | CVE-2022 -0339|
34
- | V 0.6.16 | Another case where public shelfs could be created without permission is prevented. Thanks to @nhiephon | CVE-2022 -0273|
35
- | V 0.6.16 | It's prevented to get the name of a private shelfs. Thanks to @nhiephon | CVE-2022 -0405|
36
- | V 0.6.17 | The SSRF Protection can no longer be bypassed via an HTTP redirect. Thanks to @416e6e61 | CVE-2022 -0767|
37
- | V 0.6.17 | The SSRF Protection can no longer be bypassed via 0.0.0.0 and it's ipv6 equivalent. Thanks to @r0hanSH | CVE-2022 -0766|
38
- | V 0.6.18 | Possible SQL Injection is prevented in user table Thanks to Iman Sharafaldin (Forward Security) | CVE-2022 -30765|
39
- | V 0.6.18 | The SSRF protection no longer can be bypassed by IPV6/IPV4 embedding. Thanks to @416e6e61 | CVE-2022 -0939|
40
- | V 0.6.18 | The SSRF protection no longer can be bypassed to connect to other servers in the local network. Thanks to @michaellrowley | CVE-2022 -0990|
41
- | V 0.6.20 | Credentials for emails are now stored encrypted ||
42
- | V 0.6.20 | Login is rate limited ||
43
- | V 0.6.20 | Passwordstrength can be forced ||
44
- | V 0.6.21 | SMTP server credentials are no longer returned to client ||
45
- | V 0.6.21 | Cross-site scripting (XSS) stored in href bypasses filter using data wrapper no longer possible ||
46
- | V 0.6.21 | Cross-site scripting (XSS) is no longer possible via pathchooser ||
47
- | V 0.6.21 | Error Handling at non existent rating, language, and user downloaded books was fixed ||
13
+ | Fixed in | Description | CVE number |
14
+ | ---------------| --------------------------------------------------------------------------------------------------------------------------------| ---------|
15
+ | 3rd July 2018 | Guest access acts as a backdoor ||
16
+ | V 0.6.7 | Hardcoded secret key for sessions | CVE-2020 -12627 |
17
+ | V 0.6.13 | Calibre-Web Metadata cross site scripting | CVE-2021 -25964|
18
+ | V 0.6.13 | Name of Shelves are only visible to users who can access the corresponding shelf Thanks to @ibarrionuevo ||
19
+ | V 0.6.13 | JavaScript could get executed in the description field. Thanks to @ranjit-git and Hagai Wechsler (WhiteSource) ||
20
+ | V 0.6.13 | JavaScript could get executed in a custom column of type "comment" field ||
21
+ | V 0.6.13 | JavaScript could get executed after converting a book to another format with a title containing javascript code ||
22
+ | V 0.6.13 | JavaScript could get executed after converting a book to another format with a username containing javascript code ||
23
+ | V 0.6.13 | JavaScript could get executed in the description series, categories or publishers title ||
24
+ | V 0.6.13 | JavaScript could get executed in the shelf title ||
25
+ | V 0.6.13 | Login with the old session cookie after logout. Thanks to @ibarrionuevo ||
26
+ | V 0.6.14 | CSRF was possible. Thanks to @mik317 and Hagai Wechsler (WhiteSource) | CVE-2021 -25965|
27
+ | V 0.6.14 | Migrated some routes to POST-requests (CSRF protection). Thanks to @scara31 | CVE-2021 -4164|
28
+ | V 0.6.15 | Fix for "javascript:" script links in identifier. Thanks to @scara31 | CVE-2021 -4170|
29
+ | V 0.6.15 | Cross-Site Scripting vulnerability on uploaded cover file names. Thanks to @ibarrionuevo ||
30
+ | V 0.6.15 | Creating public shelfs is now denied if user is missing the edit public shelf right. Thanks to @ibarrionuevo ||
31
+ | V 0.6.15 | Changed error message in case of trying to delete a shelf unauthorized. Thanks to @ibarrionuevo ||
32
+ | V 0.6.16 | JavaScript could get executed on authors page. Thanks to @alicaz | CVE-2022 -0352|
33
+ | V 0.6.16 | Localhost can no longer be used to upload covers. Thanks to @scara31 | CVE-2022 -0339|
34
+ | V 0.6.16 | Another case where public shelfs could be created without permission is prevented. Thanks to @nhiephon | CVE-2022 -0273|
35
+ | V 0.6.16 | It's prevented to get the name of a private shelfs. Thanks to @nhiephon | CVE-2022 -0405|
36
+ | V 0.6.17 | The SSRF Protection can no longer be bypassed via an HTTP redirect. Thanks to @416e6e61 | CVE-2022 -0767|
37
+ | V 0.6.17 | The SSRF Protection can no longer be bypassed via 0.0.0.0 and it's ipv6 equivalent. Thanks to @r0hanSH | CVE-2022 -0766|
38
+ | V 0.6.18 | Possible SQL Injection is prevented in user table Thanks to Iman Sharafaldin (Forward Security) | CVE-2022 -30765|
39
+ | V 0.6.18 | The SSRF protection no longer can be bypassed by IPV6/IPV4 embedding. Thanks to @416e6e61 | CVE-2022 -0939|
40
+ | V 0.6.18 | The SSRF protection no longer can be bypassed to connect to other servers in the local network. Thanks to @michaellrowley | CVE-2022 -0990|
41
+ | V 0.6.20 | Credentials for emails are now stored encrypted ||
42
+ | V 0.6.20 | Login is rate limited ||
43
+ | V 0.6.20 | Passwordstrength can be forced ||
44
+ | V 0.6.21 | SMTP server credentials are no longer returned to client ||
45
+ | V 0.6.21 | Cross-site scripting (XSS) stored in href bypasses filter using data wrapper no longer possible ||
46
+ | V 0.6.21 | Cross-site scripting (XSS) is no longer possible via pathchooser ||
47
+ | V 0.6.21 | Error Handling at non existent rating, language, and user downloaded books was fixed ||
48
+ | V 0.6.22 | Upload mimetype is checked to prevent malicious file content in the books library ||
49
+ | V 0.6.22 | Cross-site scripting (XSS) stored in comments section is prevented better (switching from lxml to bleach for sanitizing strings) ||
50
+ | V 0.6.23 | Cookies are no longer stored for opds basic authentication and proxy authentication ||
51
+
52
+
48
53
49
54
50
55
## Statement regarding Log4j (CVE-2021 -44228 and related)
0 commit comments