GHSA-r735-9gc6-2hvq

Suggest an improvement
Source
https://github.com/advisories/GHSA-r735-9gc6-2hvq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-r735-9gc6-2hvq/GHSA-r735-9gc6-2hvq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r735-9gc6-2hvq
Aliases
Published
2024-11-15T12:31:44Z
Modified
2024-11-19T21:01:39.354984Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site Scripting (XSS) - DOM in janeczku/calibre-web
Details

A Cross-site Scripting (XSS) vulnerability exists in janeczku/calibre-web, specifically in the file edit_books.js. The vulnerability occurs when editing book properties, such as uploading a cover or a format. The affected code directly inserts user input into the DOM without proper sanitization, allowing attackers to execute arbitrary JavaScript code. This can lead to various attacks, including stealing cookies. The issue is present in the code handling the #btn-upload-cover change event.

Database specific
{
    "nvd_published_at": "2024-11-15T11:15:06Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-15T20:52:00Z"
}
References

Affected packages

PyPI / calibreweb

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.15

Affected versions

0.*

0.6.12
0.6.13
0.6.14