PyPi: Calibreweb

CVE-2021-3986

Safety vulnerability ID: 74254

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 15, 2024 Updated at Nov 22, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of cps in calibre-web are vulnerable to Generation of Error Message Containing Sensitive Information (CWE-209). This vulnerability allows attackers to obtain the names of private shelves through error messages when attempting unauthorized actions such as adding or removing books. The attack vector involves triggering these actions, resulting in logs or user-facing flash messages that include shelf.name in shelf.py. To mitigate, upgrade to the version that removes the exposure of shelf names from error messages, thereby preventing information leakage.

Affected package

calibreweb

Latest version: 0.6.24

Web app for browsing, reading and downloading eBooks stored in a Calibre database.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.3

CVSS v3 Details

MEDIUM 4.3
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
NONE
Availability Availability (A)
NONE