← Voltar para CVEs
CVE-2018-20250
HIGHCISA KEV7.8
Descricao
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado2/5/2019
Ultima modificacao10/31/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorRARLAB
ProdutoWinRAR
Nome da vulnerabilidadeWinRAR Absolute Path Traversal Vulnerability
Data inclusao KEV2022-02-15
Prazo de remediacao2022-08-15
Uso em ransomwareKnown
Produtos afetados
rarlab:winrar
Fraquezas (CWE)
CWE-36CWE-22
Referencias
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(cve@checkpoint.com)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(cve@checkpoint.com)
http://www.securityfocus.com/bid/106948(cve@checkpoint.com)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(cve@checkpoint.com)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46552/(cve@checkpoint.com)
https://www.exploit-db.com/exploits/46756/(cve@checkpoint.com)
https://www.win-rar.com/whatsnew.html(cve@checkpoint.com)
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106948(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE(af854a3a-2127-422b-91ae-364da2661108)
https://research.checkpoint.com/extracting-code-execution-from-winrar/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46552/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46756/(af854a3a-2127-422b-91ae-364da2661108)
https://www.win-rar.com/whatsnew.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-20250(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.