gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/calibre/+bug/1753870 | Exploit Third Party Advisory |
https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d | Patch |
https://bugs.launchpad.net/calibre/+bug/1753870 | Exploit Third Party Advisory |
https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d | Patch |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/calibre/+bug/1753870 - Exploit, Third Party Advisory | |
References | () https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d - Patch |
Information
Published : 2018-03-08 21:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7889
Mitre link : CVE-2018-7889
CVE.ORG link : CVE-2018-7889
JSON object : View
Products Affected
calibre-ebook
- calibre
CWE
CWE-502
Deserialization of Untrusted Data