支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-6218 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
对路径名的限制不恰当(路径遍历)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
WinRAR 路径遍历漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在路径遍历漏洞,该漏洞源于处理存档文件路径不当,可能导致目录遍历和远程代码执行。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
RARLABWinRAR 7.11 (64-bit) -
二、漏洞 CVE-2025-6218 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/speinador/CVE-2025-6218_WinRARPOC详情
2A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218https://github.com/ignis-sec/CVE-2025-6218POC详情
3Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improper handling of archive extraction paths.https://github.com/skimask1690/CVE-2025-6218-POCPOC详情
4RARLAB WinRAR Directory Traversal Remote Code Executionhttps://github.com/mulwareX/CVE-2025-6218-POCPOC详情
5CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction directory when a user extracts a specially craftedhttps://github.com/absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCEPOC详情
6Sigma detection rules for Windows threats, including WinRAR CVE-2025-6218 exploitation techniques, designed for SOC and CTI use.https://github.com/hatchepsoout/sigma-rulesPOC详情
7Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlierhttps://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POCPOC详情
8Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.https://github.com/Hatchepsoute/sigma-rulesPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-6218 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2025-6218 的评论

暂无评论


发表评论