CVE-2018-20250
WinRAR Absolute Path Traversal Vulnerability
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
26
*Multiple Sources
Exploited in Wild
Yes
*KEV
Decision
Act
*SSVC
Descriptions
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
En WinRAR, en versiones anteriores a la 5.61, hay una vulnerabilidad de salto de directorio al manipular el campo "filename" del formato ACE (en UNACEV2.dll). Cuando este campo se manipula con patrones específicos, la carpeta de destino (extracción) se ignora, tratando el nombre de archivo como ruta absoluta.
WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Act
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-12-19 CVE Reserved
- 2019-02-05 CVE Published
- 2019-02-22 First Exploit
- 2022-02-15 Exploited in Wild
- 2022-08-15 KEV Due Date
- 2025-02-07 CVE Updated
- 2025-03-18 EPSS Updated
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-36: Absolute Path Traversal
CAPEC
References (31)
URL | Tag | Source |
---|---|---|
http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace | Third Party Advisory | |
http://www.securityfocus.com/bid/106948 | Broken Link | |
https://www.win-rar.com/whatsnew.html | Release Notes | |
https://apidoc.roe.ch/acefile/latest | ||
http://www.hugi.scene.org/online/coding/hugi%2012%20-%20coace.htm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|