Arbitrary Code Execution via Pickle Deserialization in Calibre 3.18

Arbitrary Code Execution via Pickle Deserialization in Calibre 3.18

CVE-2018-7889 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

Learn more about our Web Application Penetration Testing UK.