In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace | Third Party Advisory |
http://www.securityfocus.com/bid/106948 | Third Party Advisory VDB Entry |
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE | Exploit Third Party Advisory |
https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46552/ | Exploit VDB Entry Third Party Advisory |
https://www.exploit-db.com/exploits/46756/ | Exploit VDB Entry Third Party Advisory |
https://www.win-rar.com/whatsnew.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: checkpoint
Published: 2019-02-05T00:00:00
Updated: 2019-04-25T18:06:08
Reserved: 2018-12-19T00:00:00
Link: CVE-2018-20250
JSON object: View
NVD Information
Status : Modified
Published: 2019-02-05T20:29:00.243
Modified: 2019-10-09T23:39:36.057
Link: CVE-2018-20250
JSON object: View
Redhat Information
No data.