This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Path Traversal in Calibre's Content Server. <br>π₯ **Consequences**: Attackers can read **arbitrary files** from the host system. Critical data exposure risk! π
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: **CWE-22** (Path Traversal). <br>π **Flaw**: Insufficient validation of user-supplied file paths in the content server component. Allows `../` sequences to escape directories.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: **Calibre** (Open Source E-book Manager). <br>π¦ **Versions**: **7.14.0 and earlier**. If you are running an older version, you are vulnerable! β οΈ
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Actions**: <br>1οΈβ£ Read **sensitive files** (configs, keys, personal docs). <br>2οΈβ£ No authentication required. <br>3οΈβ£ High Confidentiality impact (C:H). π
π£ **Public Exp?**: **YES**. <br>π **PoC**: Available via **Nuclei Templates** (ProjectDiscovery). <br>π **Wild Exploitation**: Likely, given the low barrier to entry. πΈοΈ
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1οΈβ£ Check Calibre version (β€ 7.14.0). <br>2οΈβ£ Scan for exposed **Content Server** ports. <br>3οΈβ£ Use Nuclei template `CVE-2024-6781.yaml` for automated detection. π€
π§ **No Patch?**: <br>1οΈβ£ **Disable** the Content Server if not needed. <br>2οΈβ£ Restrict network access to the Calibre interface via firewall. <br>3οΈβ£ Monitor logs for suspicious path traversal attempts. π
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. <br>π **Published**: 2024-08-06. <br>β‘ **Reason**: Remote, unauthenticated, high impact. Patch now to prevent data leaks! πββοΈπ¨