Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://starlabs.sg/advisories/24/24-6781/ | third party advisory |
https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4 | patch |