In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.
References
Link | Resource |
---|---|
https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4ce75acfce | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 | Third Party Advisory |
Configurations
History
19 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Janeczku
Janeczku calibre-web |
|
CPE | cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:* |
Information
Published : 2021-10-04 15:15
Updated : 2024-11-19 13:55
NVD link : CVE-2021-25964
Mitre link : CVE-2021-25964
CVE.ORG link : CVE-2021-25964
JSON object : View
Products Affected
janeczku
- calibre-web
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')