# N/A
## 漏洞概述
WinRAR 在 6.23 版本之前存在漏洞,当用户尝试查看 ZIP 归档中的良性文件时,攻击者可以执行任意代码。问题出在 ZIP 归档可以包括一个良性文件(例如普通的 .JPG 文件)和一个具有相同名称的文件夹,而该文件夹的内容(可能包括可执行内容)会在仅尝试访问良性文件时被处理。
## 影响版本
- WinRAR 6.23 之前的所有版本
## 细节
- 攻击者可以构造一个 ZIP 文件,其中包含一个良性文件(如 .JPG 文件)以及一个具有相同名称的文件夹,文件夹内可能包含可执行内容。
- 当用户尝试查看良性文件时,WinRAR 会处理文件夹内容并导致任意代码执行。
## 影响
- 该漏洞在 2023 年 4 月至 2023 年 10 月期间被利用。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | lazy way to create CVE-2023-38831 winrar file for testing | https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc | POC详情 |
| 2 | CVE-2023-38831 winrar exploit generator | https://github.com/b1tg/CVE-2023-38831-winrar-exploit | POC详情 |
| 3 | None | https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT | POC详情 |
| 4 | 一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。 | https://github.com/Garck3h/cve-2023-38831 | POC详情 |
| 5 | An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23 | https://github.com/ignis-sec/CVE-2023-38831-RaRCE | POC详情 |
| 6 | CVE-2023-38831 PoC (Proof Of Concept) | https://github.com/HDCE-inc/CVE-2023-38831 | POC详情 |
| 7 | Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23. | https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE | POC详情 |
| 8 | Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) | https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831 | POC详情 |
| 9 | CVE-2023-38831 WinRAR | https://github.com/akhomlyuk/cve-2023-38831 | POC详情 |
| 10 | KQL Hunting for WinRAR CVE-2023-38831 | https://github.com/PascalAsch/CVE-2023-38831-KQL | POC详情 |
| 11 | CVE-2023-38831 winrar exploit generator and get reverse shell | https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc | POC详情 |
| 12 | Proof of Concept (POC) for CVE-2023-38831 WinRAR | https://github.com/thegr1ffyn/CVE-2023-38831 | POC详情 |
| 13 | This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. | https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection | POC详情 |
| 14 | winrar exploit 6.22 <= | https://github.com/nhman-python/CVE-2023-38831 | POC详情 |
| 15 | Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR | https://github.com/z3r0sw0rd/CVE-2023-38831-PoC | POC详情 |
| 16 | None | https://github.com/BeniBeastt/CVE-2023-38831_ReverseShell_Winrar | POC详情 |
| 17 | This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code. | https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC | POC详情 |
| 18 | CVE-2023-38831 winrar exploit builder | https://github.com/Mich-ele/CVE-2023-38831-winrar | POC详情 |
| 19 | None | https://github.com/asepsaepdin/CVE-2023-38831 | POC详情 |
| 20 | CVE-2023-38831-WINRAR-EXPLOIT GENERATOR | https://github.com/K3rnel-Dev/WinrarExploit | POC详情 |
| 21 | None | https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit | POC详情 |
| 22 | This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution. | https://github.com/xaitax/WinRAR-CVE-2023-38831 | POC详情 |
| 23 | Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23. | https://github.com/GOTonyGO/CVE-2023-38831-winrar | POC详情 |
| 24 | CVE-2023-38831 WinRaR Exploit Generator | https://github.com/Malwareman007/CVE-2023-38831 | POC详情 |
| 25 | Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability | https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit | POC详情 |
| 26 | None | https://github.com/IMHarman/CVE-2023-38831 | POC详情 |
| 27 | None | https://github.com/an040702/CVE-2023-38831 | POC详情 |
| 28 | DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores. | https://github.com/elefantesagradodeluzinfinita/cve-2023-38831 | POC详情 |
| 29 | Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR | https://github.com/malvika-thakur/CVE-2023-38831 | POC详情 |
| 30 | None | https://github.com/ruycr4ft/CVE-2023-38831 | POC详情 |
| 31 | None | https://github.com/Nielk74/CVE-2023-38831 | POC详情 |
| 32 | CVE-2023-38831 is an RCE in WinRAR (<6.23) | https://github.com/kehrijksen/CVE-2023-38831 | POC详情 |
| 33 | SideCopy APT Group exploits CVE-2023-38831 | https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831 | POC详情 |
| 34 | WinRAR cve-2023-38831-poc-generator | https://github.com/s4m98/winrar-cve-2023-38831-poc-gen | POC详情 |
| 35 | WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现 | https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial | POC详情 |
| 36 | Proof-of-concept of CVE-2023-38831 | https://github.com/MyStuffYT/CVE-2023-38831-POC | POC详情 |
| 37 | None | https://github.com/80r1ng/CVE-2023-38831-EXP | POC详情 |
| 38 | CVE-2023-38831 Proof-of-concept code | https://github.com/SpamixOfficial/CVE-2023-38831 | POC详情 |
| 39 | Exploit Development using python for CVE-2023-38831 (POC) | https://github.com/r1yaz/winDED | POC详情 |
| 40 | None | https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar | POC详情 |
| 41 | CVE-2023-38831 winrar exploit generator and get reverse shell | https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc | POC详情 |
| 42 | evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework) | https://github.com/youmulijiang/evil-winrar | POC详情 |
| 43 | This is my malware | https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC | POC详情 |
| 44 | None | https://github.com/RomainBayle08/CVE-2023-38831 | POC详情 |
| 45 | winrar exploit 6.22 <= | https://github.com/sh770/CVE-2023-38831 | POC详情 |
| 46 | WinRAR漏洞测试复现。详参:https://flowus.cn/share/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b | https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831 | POC详情 |
| 47 | None | https://github.com/khanhtranngoccva/cve-2023-38831-poc | POC详情 |
| 48 | Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique. | https://github.com/MaorBuskila/Windows-X64-RAT | POC详情 |
| 49 | This Python application scans for the CVE-2023-38831 vulnerability in WinRAR. | https://github.com/yezzfusl/cve_2023_38831_scanner | POC详情 |
| 50 | A POC demo on CVE-2023-38831 | https://github.com/FirFirdaus/CVE-2023-38831 | POC详情 |
| 51 | d | https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831 | POC详情 |
| 52 | None | https://github.com/technicalcorp2/CVE-2023-38831-exploit-generator | POC详情 |
| 53 | This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). | https://github.com/technicalcorp0/CVE-2023-38831-Exploit | POC详情 |
| 54 | None | https://github.com/idkwastaken/CVE-2023-38831 | POC详情 |
| 55 | None | https://github.com/vilonachan/CVE-2023-38831-Winrar-Exploit-Generator-POC | POC详情 |
| 56 | None | https://github.com/vilonachan/CVE-2023-38831-winrar-exploit | POC详情 |
| 57 | CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content. | https://github.com/RonF98/CVE-2023-38831-POC | POC详情 |
| 58 | None | https://github.com/VictoriousKnight/CVE-2023-38831_Exploit | POC详情 |
| 59 | POC Exploit Script in Python | https://github.com/kuyrathdaro/winrar-cve-2023-38831 | POC详情 |
| 60 | CVE-2023-38831WinRAR代码执行漏洞复现资源文件 | https://github.com/chaos198800/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian | POC详情 |
| 61 | This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. | https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection | POC详情 |
| 62 | None | https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar | POC详情 |
| 63 | This project demonstrates a simulated exploitation of the WinRAR vulnerability CVE-2023-38831 to execute a reverse shell. The purpose of this task was to showcase how attackers can weaponize compressed archive files to gain remote access to a target machine. | https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution | POC详情 |
| 64 | ict519 assignment | https://github.com/yangdayyy/cve-2023-38831 | POC详情 |
暂无评论