Loading HuntDB...

Vulnerabilities

CVE-2024-36676

HIGH

Incorrect access control in BookStack before v24.05.1 allows attackers to confirm existing system users and perform targeted notification email DoS via public facing forms.

Published Jul 09, 2024

CVE-2023-4624

LOW

Server-Side Request Forgery (SSRF) in GitHub repository bookstackapp/bookstack prior to v23.08.

Published Aug 30, 2023

CVE-2022-0877

HIGH

Cross-site Scripting (XSS) - Stored in GitHub repository bookstackapp/bookstack prior to v22.02.3.

Published Mar 08, 2022

CVE-2021-4194

MEDIUM

bookstack is vulnerable to Improper Access Control

Published Jan 06, 2022

CVE-2021-4119

MEDIUM

bookstack is vulnerable to Improper Access Control

Published Dec 15, 2021

CVE-2021-3944

LOW

bookstack is vulnerable to Cross-Site Request Forgery (CSRF)

Published Dec 02, 2021

CVE-2021-4026

MEDIUM

bookstack is vulnerable to Improper Access Control

Published Nov 30, 2021

CVE-2021-3915

HIGH

bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type

Published Nov 13, 2021

CVE-2021-3916

MEDIUM

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Published Nov 05, 2021

CVE-2021-3906

MEDIUM

bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type

Published Oct 27, 2021

CVE-2021-3874

MEDIUM

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Published Oct 15, 2021

CVE-2021-3768

MEDIUM

bookstack is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Published Sep 06, 2021

CVE-2021-3767

MEDIUM

bookstack is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Published Sep 06, 2021

CVE-2021-3758

MEDIUM

bookstack is vulnerable to Server-Side Request Forgery (SSRF)

Published Sep 02, 2021

CVE-2020-26260

MEDIUM

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

Published Dec 09, 2020

CVE-2020-26211

HIGH

In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a particular meta tag which could be used to silently redirect users to a alternative location upon visit of a page. Dangerous content may remain in the database but will be removed before being displayed on a page. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround without upgrading, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in BookStack version 0.30.4.

Published Nov 03, 2020

CVE-2020-26210

HIGH

In BookStack before version 0.30.4, a user with permissions to edit a page could add an attached link which would execute untrusted JavaScript code when clicked by a viewer of the page. Dangerous content may remain in the database after this update. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in version 0.30.4.

Published Nov 03, 2020

CVE-2020-11055

MEDIUM

In BookStack greater than or equal to 0.18.0 and less than 0.29.2, there is an XSS vulnerability in comment creation. A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines. This most impacts scenarios where not-trusted users are given permission to create comments. This has been fixed in 0.29.2.

Published May 07, 2020

CVE-2020-5256

HIGH

BookStack before version 0.25.5 has a vulnerability where a user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process. This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application. The issue was addressed in a series of patches in versions 0.25.3, 0.25.4 and 0.25.5. Users should upgrade to at least v0.25.5 to avoid this vulnerability.

Published Mar 09, 2020