by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package calibre-web
- @LeSuisse accepted
- @LeSuisse published on GitHub
calibre Vulnerable to HTTP Response Header Injection
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.
References
-
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-5fpj-fxw7-8grw x_refsource_CONFIRM
Affected products
- ==< 9.4.0
Matching in nixpkgs
pkgs.calibre
Comprehensive e-book software
pkgs.pkgsRocm.calibre
Comprehensive e-book software
pkgs.calibre-no-speech
Comprehensive e-book software
pkgs.pkgsRocm.calibre-no-speech
Comprehensive e-book software
Package maintainers
-
@pSub Pascal Wittmann <mail@pascal-wittmann.de>