Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-38831
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WinRAR 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2023-38831
#POC DescriptionSource LinkShenlong Link
1lazy way to create CVE-2023-38831 winrar file for testinghttps://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_pocPOC Details
2CVE-2023-38831 winrar exploit generatorhttps://github.com/b1tg/CVE-2023-38831-winrar-exploitPOC Details
3Nonehttps://github.com/IR-HuntGuardians/CVE-2023-38831-HUNTPOC Details
4一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。https://github.com/Garck3h/cve-2023-38831POC Details
5An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23https://github.com/ignis-sec/CVE-2023-38831-RaRCEPOC Details
6CVE-2023-38831 PoC (Proof Of Concept)https://github.com/HDCE-inc/CVE-2023-38831POC Details
7Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCEPOC Details
8Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831POC Details
9CVE-2023-38831 WinRARhttps://github.com/akhomlyuk/cve-2023-38831POC Details
10KQL Hunting for WinRAR CVE-2023-38831https://github.com/PascalAsch/CVE-2023-38831-KQLPOC Details
11CVE-2023-38831 winrar exploit generator and get reverse shellhttps://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-PocPOC Details
12Proof of Concept (POC) for CVE-2023-38831 WinRARhttps://github.com/thegr1ffyn/CVE-2023-38831POC Details
13This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-DetectionPOC Details
14winrar exploit 6.22 <=https://github.com/nhman-python/CVE-2023-38831POC Details
15Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRARhttps://github.com/z3r0sw0rd/CVE-2023-38831-PoCPOC Details
16Nonehttps://github.com/BeniBeastt/CVE-2023-38831_ReverseShell_WinrarPOC Details
17This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POCPOC Details
18CVE-2023-38831 winrar exploit builderhttps://github.com/Mich-ele/CVE-2023-38831-winrarPOC Details
19Nonehttps://github.com/asepsaepdin/CVE-2023-38831POC Details
20CVE-2023-38831-WINRAR-EXPLOIT GENERATORhttps://github.com/K3rnel-Dev/WinrarExploitPOC Details
21Nonehttps://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploitPOC Details
22This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.https://github.com/xaitax/WinRAR-CVE-2023-38831POC Details
23Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.https://github.com/GOTonyGO/CVE-2023-38831-winrarPOC Details
24CVE-2023-38831 WinRaR Exploit Generatorhttps://github.com/Malwareman007/CVE-2023-38831POC Details
25Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerabilityhttps://github.com/ameerpornillos/CVE-2023-38831-WinRAR-ExploitPOC Details
26Nonehttps://github.com/IMHarman/CVE-2023-38831POC Details
27Nonehttps://github.com/an040702/CVE-2023-38831POC Details
28DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores.https://github.com/elefantesagradodeluzinfinita/cve-2023-38831POC Details
29Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRARhttps://github.com/malvika-thakur/CVE-2023-38831POC Details
30Nonehttps://github.com/ruycr4ft/CVE-2023-38831POC Details
31Nonehttps://github.com/Nielk74/CVE-2023-38831POC Details
32CVE-2023-38831 is an RCE in WinRAR (<6.23)https://github.com/kehrijksen/CVE-2023-38831POC Details
33SideCopy APT Group exploits CVE-2023-38831https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831POC Details
34WinRAR cve-2023-38831-poc-generatorhttps://github.com/s4m98/winrar-cve-2023-38831-poc-genPOC Details
35WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorialPOC Details
36Proof-of-concept of CVE-2023-38831https://github.com/MyStuffYT/CVE-2023-38831-POCPOC Details
37Nonehttps://github.com/80r1ng/CVE-2023-38831-EXPPOC Details
38CVE-2023-38831 Proof-of-concept codehttps://github.com/SpamixOfficial/CVE-2023-38831POC Details
39Exploit Development using python for CVE-2023-38831 (POC)https://github.com/r1yaz/winDEDPOC Details
40Nonehttps://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_WinrarPOC Details
41CVE-2023-38831 winrar exploit generator and get reverse shellhttps://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-PocPOC Details
42evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)https://github.com/youmulijiang/evil-winrarPOC Details
43This is my malwarehttps://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UACPOC Details
44Nonehttps://github.com/RomainBayle08/CVE-2023-38831POC Details
45winrar exploit 6.22 <=https://github.com/sh770/CVE-2023-38831POC Details
46WinRAR漏洞测试复现。详参:https://flowus.cn/share/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7bhttps://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831POC Details
47Nonehttps://github.com/khanhtranngoccva/cve-2023-38831-pocPOC Details
48Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique.https://github.com/MaorBuskila/Windows-X64-RATPOC Details
49This Python application scans for the CVE-2023-38831 vulnerability in WinRAR.https://github.com/yezzfusl/cve_2023_38831_scannerPOC Details
50A POC demo on CVE-2023-38831https://github.com/FirFirdaus/CVE-2023-38831POC Details
51dhttps://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831POC Details
52Nonehttps://github.com/technicalcorp2/CVE-2023-38831-exploit-generatorPOC Details
53This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). https://github.com/technicalcorp0/CVE-2023-38831-ExploitPOC Details
54Nonehttps://github.com/idkwastaken/CVE-2023-38831POC Details
55Nonehttps://github.com/vilonachan/CVE-2023-38831-Winrar-Exploit-Generator-POCPOC Details
56Nonehttps://github.com/vilonachan/CVE-2023-38831-winrar-exploitPOC Details
57CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content.https://github.com/RonF98/CVE-2023-38831-POCPOC Details
58Nonehttps://github.com/VictoriousKnight/CVE-2023-38831_ExploitPOC Details
59POC Exploit Script in Pythonhttps://github.com/kuyrathdaro/winrar-cve-2023-38831POC Details
60CVE-2023-38831WinRAR代码执行漏洞复现资源文件https://github.com/chaos198800/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jianPOC Details
61This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-DetectionPOC Details
62Nonehttps://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_WinrarPOC Details
63This project demonstrates a simulated exploitation of the WinRAR vulnerability CVE-2023-38831 to execute a reverse shell. The purpose of this task was to showcase how attackers can weaponize compressed archive files to gain remote access to a target machine. https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-ExecutionPOC Details
64ict519 assignmenthttps://github.com/yangdayyy/cve-2023-38831POC Details
65winrar exploit 6.22 <=https://github.com/sudo-py-dev/CVE-2023-38831POC Details
66Nonehttps://github.com/anelya0333/Exploiting-CVE-2023-38831POC Details
67CVE-2023-38831 ZIP Structure Detection Frameworkhttps://github.com/ouoxii/Software-Testing-Final-ProjectPOC Details
68CVE-2023-38831 (PoC) - WinRAR Exploithttps://github.com/kuyrathdaro/cve-2023-38831POC Details
69CVE-2023-38831 - WinRARhttps://github.com/mishra0230/CVE-2023-38831POC Details
70Nonehttps://github.com/ngothienan/CVE-2023-38831POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-38831
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-38831

No comments yet


Leave a comment