gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
References
Link | Resource |
---|---|
https://github.com/kovidgoyal/calibre/commit/aeb5b036a0bf657951756688b3c72bd68b6e4a7d | Patch |
https://bugs.launchpad.net/calibre/+bug/1753870 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-03-08 13:29
Updated : 2018-10-12 11:21
NVD link : CVE-2018-7889
Mitre link : CVE-2018-7889
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
calibre-ebook
- calibre