← Back to CVEs
CVE-2022-23596
HIGH7.5
Description
Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/1/2022
Last Modified5/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
junrar_project:junrar
Weaknesses (CWE)
CWE-835CWE-835
References
https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7(security-advisories@github.com)
https://github.com/junrar/junrar/issues/73(security-advisories@github.com)
https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5(security-advisories@github.com)
https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/junrar/junrar/issues/73(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.