Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
References
Link | Resource |
---|---|
https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4 | Patch |
https://starlabs.sg/advisories/24/24-6781/ | Third Party Advisory |
Configurations
History
19 Aug 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4 - Patch | |
References | () https://starlabs.sg/advisories/24/24-6781/ - Third Party Advisory | |
CPE | cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:* | |
First Time |
Calibre-ebook calibre
Calibre-ebook |
06 Aug 2024, 16:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Aug 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-06 04:16
Updated : 2024-08-19 17:15
NVD link : CVE-2024-6781
Mitre link : CVE-2024-6781
CVE.ORG link : CVE-2024-6781
JSON object : View
Products Affected
calibre-ebook
- calibre
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')