Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/multi/misc/calibre_exec.md
Views: 11784
Vulnerable Application
Vulnerability Description
This module exploits a vulnerability in Calibre <= v6.9.0 - v7.15.0 (CVE-2024-6782).
An unauthenticated remote attacker can exploit this vulnerability to gain arbitrary code execution in the context of which Calibre is being executed.
All versions between v6.9.0 - v7.15.0 are affected. STAR Labs published an advisory that includes the root cause analysis and a proof-of-concept.
Vulnerable Application Installation
Calibre can be downloaded from here.
Successfully tested on
Windows:
Calibre v7.15 on Windows 10 22H2
Calibre v7.14 on Windows 10 22H2
Calibre v7.0 on Windows 10 22H2
Calibre v6.29 on Windows 10 22H2
Calibre v6.9 on Windows 10 22H2
Linux:
Calibre v7.15 on Ubuntu 24.04 LTS
Calibre v7.14 on Ubuntu 24.04 LTS
Calibre v7.0 on Ubuntu 24.04 LTS
Calibre v6.29 on Ubuntu 24.04 LTS
Calibre v6.9 on Ubuntu 24.04 LTS
Verification Steps
Install Calibre
Start Calibre and click Connect/share > Start Content server
Start
msfconsole
and run the following commands:
You should get a meterpreter session running in the same context as the Calibre application.
Scenarios
Windows
Running the exploit against Calibre v7.14 on Windows 10 22H2, using curl as a fetch command, should result in an output similar to the following:
Linux
Running the exploit against Calibre v7.14 on Ubuntu 24.04 LTS, using cmd/unix/python/meterpreter/reverse_tcp as a payload, should result in an output similar to the following: