TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2018-20250

HIGHCISA KEV
7.8

Beschreibung

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.

CVE Details

CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht2/5/2019
Zuletzt geandert10/31/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerRARLAB
ProduktWinRAR
SchwachstellennameWinRAR Absolute Path Traversal Vulnerability
KEV Aufnahmedatum2022-02-15
Behebungsfrist2022-08-15
Ransomware-NutzungKnown

Betroffene Produkte

rarlab:winrar

Schwachen (CWE)

CWE-36CWE-22

Referenzen

http://www.securityfocus.com/bid/106948(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46552/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46756/(af854a3a-2127-422b-91ae-364da2661108)
https://www.win-rar.com/whatsnew.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.