← Retour aux CVEs
CVE-2018-20250
HIGHCISA KEV7.8
Description
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie2/5/2019
Derniere modification10/31/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurRARLAB
ProduitWinRAR
Nom vulnerabiliteWinRAR Absolute Path Traversal Vulnerability
Date ajout KEV2022-02-15
Date limite remediation2022-08-15
Utilise dans ransomwareKnown
Produits affectes
rarlab:winrar
Faiblesses (CWE)
CWE-36CWE-22
References
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(cve@checkpoint.com)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(cve@checkpoint.com)
http://www.securityfocus.com/bid/106948(cve@checkpoint.com)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(cve@checkpoint.com)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46552/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46756/(cve@checkpoint.com)
https://www.win-rar.com/whatsnew.html(cve@checkpoint.com)
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106948(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(af854a3a-2127-422b-91ae-364da2661108)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46552/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46756/(af854a3a-2127-422b-91ae-364da2661108)
https://www.win-rar.com/whatsnew.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-20250(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.