Arbitrary Code Execution via Pickle Deserialization in Calibre 3.18
CVE-2018-7889 · MEDIUM Severity
AV:N/AC:M/AU:N/C:P/I:P/A:P
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
Learn more about our Web Application Penetration Testing UK.