calibreweb@0.6.13 vulnerabilities

Web app for browsing, reading and downloading eBooks stored in a Calibre database.

  • latest version

    0.6.24

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    5 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the calibreweb package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the edit_books.js component due to improper user input sanitization. An attacker can inject malicious scripts through upload filename fields by exploiting the use of the .html() method to display filenames.

    How to fix Cross-site Scripting (XSS)?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • M
    Information Exposure

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Information Exposure in shelf.py, which includes the name of the shelf in error output. An attacker can view shelf names owned by other users by attempting to remove a book from a shelf they do not own.

    How to fix Information Exposure?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • M
    Missing Authorization

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Missing Authorization for the create_shelf() function in shelf.py. A low-privileged user can creating public shelves by passing the is_public=on parameter.

    How to fix Missing Authorization?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • M
    Cross-site Scripting (XSS)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the edit_book_comments function. An attacker can inject malicious scripts by exploiting the inadequate HTML sanitization performed by the clean_string function.

    How to fix Cross-site Scripting (XSS)?

    Upgrade calibreweb to version 0.6.22 or higher.

    [,0.6.22)
    • H
    Weak Password Requirements

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Weak Password Requirements due to missing rate limits in the login functionality.

    How to fix Weak Password Requirements?

    Upgrade calibreweb to version 0.6.20 or higher.

    [,0.6.20)
    • H
    Brute Force

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Brute Force due to missing rate limiting in login form.

    How to fix Brute Force?

    Upgrade calibreweb to version 0.6.20 or higher.

    [,0.6.20)
    • C
    SQL Injection

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to SQL Injection in the user table.

    How to fix SQL Injection?

    Upgrade calibreweb to version 0.6.18 or higher.

    [,0.6.18)
    • H
    Server-side Request Forgery (SSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper fix of CVE-2022-0767 and CVE-2022-0766 which only address loopback/localhost IP addresses which can allow attacker to access internal endpoints.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade calibreweb to version 0.6.18 or higher.

    [,0.6.18)
    • M
    Improper Access Control

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Improper Access Control due to improper HTML rendering, when the user doesn't have view permissions to read the name of a private shelf, the server continues to render the HTML containing shelf.name instead of showing error messages and redirect. Exploiting this vulnerability leads to disclosing the name of the private shelf.

    How to fix Improper Access Control?

    Upgrade calibreweb to version 0.6.16 or higher.

    [,0.6.16)
    • C
    Server-side Request Forgery (SSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper fix CVE-2022-0767, which makes it possible to be bypassed via the IPV4/IPV4 embedding.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade calibreweb to version 0.6.18 or higher.

    [,0.6.18)
    • C
    Server-side Request Forgery (SSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to an incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server that is set up to respond with a 302 redirect may redirect a request to localhost.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade calibreweb to version 0.6.17 or higher.

    [,0.6.17)
    • M
    Server-side Request Forgery (SSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to an incomplete fix for CVE-2022-0339. The blacklist does not check for 0.0.0.0, which would result in a payload of 0.0.0.0 resolving to localhost.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade calibreweb to version 0.6.17 or higher.

    [,0.6.17)
    • M
    Improper Access Control

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Improper Access Control. This is caused because low-level users can create a new shelf with public mode.

    How to fix Improper Access Control?

    Upgrade calibreweb to version 0.6.16 or higher.

    [,0.6.16)
    • M
    Cross-site Scripting (XSS)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of safe statement.

    How to fix Cross-site Scripting (XSS)?

    Upgrade calibreweb to version 0.6.16 or higher.

    [,0.6.16)
    • M
    Server-side Request Forgery (SSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization of Fetch Cover from URL field, which makes it possible to point to a malicious server instead of an external URL.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade calibreweb to version 0.6.16 or higher.

    [,0.6.16)
    • H
    Cross-site Request Forgery (CSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) by accepting GET requests instead of POST on various endpoints, allowing

    ###PoC

    <form action="http://127.0.0.1:8083/shutdown" method="GET">
    <input type="hidden" name="parameter" value="1"/>
    <input type="submit" value="Shutdown"/>
    </form>
    

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • M
    Business Logic Errors

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Business Logic Errors due to the possibility to create two public-facing bookshelves with the same name.

    How to fix Business Logic Errors?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • H
    Cross-site Scripting (XSS)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) by inserting a string containing a script in the "Identifiers" field, using the javascript: scheme.

    How to fix Cross-site Scripting (XSS)?

    Upgrade calibreweb to version 0.6.15 or higher.

    [,0.6.15)
    • H
    Cross-site Request Forgery (CSRF)

    calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade calibreweb to version 0.6.14 or higher.

    [0.6.12,0.6.14)