← Volver a CVEs
CVE-2018-20250
HIGHCISA KEV7.8
Descripcion
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado2/5/2019
Ultima modificacion10/31/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorRARLAB
ProductoWinRAR
Nombre vulnerabilidadWinRAR Absolute Path Traversal Vulnerability
Fecha inclusion KEV2022-02-15
Fecha limite remediacion2022-08-15
Uso en ransomwareKnown
Productos afectados
rarlab:winrar
Debilidades (CWE)
CWE-36CWE-22
Referencias
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(cve@checkpoint.com)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(cve@checkpoint.com)
http://www.securityfocus.com/bid/106948(cve@checkpoint.com)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(cve@checkpoint.com)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46552/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46756/(cve@checkpoint.com)
https://www.win-rar.com/whatsnew.html(cve@checkpoint.com)
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106948(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(af854a3a-2127-422b-91ae-364da2661108)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46552/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46756/(af854a3a-2127-422b-91ae-364da2661108)
https://www.win-rar.com/whatsnew.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-20250(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.