module
Calibre Python Code Injection (CVE-2024-6782)
Disclosed | Created |
---|---|
2024-07-31 | 2024-08-08 |
Disclosed
2024-07-31
Created
2024-08-08
Description
This module exploits a Python code injection vulnerability in the Content Server component of Calibre v6.9.0 - v7.15.0. Once enabled (disabled by default), it will listen in its default configuration on all network interfaces on TCP port 8080 for incoming traffic, and does not require any authentication. The injected payload will get executed in the same context under which Calibre is being executed.
Authors
Amos Ng
Michael Heinzl
Michael Heinzl
Platform
Linux,Unix,Windows
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.