支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2025-8088 基础信息
漏洞信息
                                        # WinRAR 路径遍历漏洞

## 概述

Windows 版本的 WinRAR 存在路径穿越漏洞,攻击者可通过构造恶意压缩文件在目标系统上执行任意代码。

## 影响版本

受影响的为存在该漏洞的 WinRAR Windows 版本(具体版本未提及)。

## 细节

漏洞允许攻击者通过精心构造的恶意存档文件触发路径穿越,从而在目标机器上执行任意代码。此漏洞已在实际攻击中被利用。

## 影响

成功利用该漏洞可导致远程代码执行,攻击者可完全控制受影响系统。
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Path traversal vulnerability in WinRAR
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
路径遍历:’…/…//’
来源:美国国家漏洞数据库 NVD
漏洞标题
WinRAR 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在安全漏洞,该漏洞源于路径遍历问题,可能导致任意代码执行。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-8088 的公开POC
#POC 描述源链接神龙链接
1Python tool for safe archive handling, path traversal awareness, and secure extraction. Inspired by CVE-2025-8088.https://github.com/jordan922/CVE-2025-8088POC详情
2cve-2025-8088_detectionhttps://github.com/travisbgreen/cve-2025-8088POC详情
3WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RARPOC详情
4CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-POC详情
5Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088https://github.com/onlytoxi/CVE-2025-8088-Winrar-ToolPOC详情
6Nonehttps://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoCPOC详情
7Exploit systems using older WinRARhttps://github.com/pentestfunctions/CVE-2025-8088-Multi-DocumentPOC详情
8Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoCPOC详情
9Nonehttps://github.com/Syrins/CVE-2025-8088-Winrar-Tool-GuiPOC详情
10🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RARPOC详情
11This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.https://github.com/ghostn4444/CVE-2025-8088POC详情
12Nonehttps://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoCPOC详情
13POWERSHEL script to check if your device is affected or nohttps://github.com/pescada-dev/-CVE-2025-8088POC详情
14An engaging walkthrough on uncovering, patching, and securing the WinRAR CVE-2025-8088 with a hands-on hacker’s twist.https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-TraversalPOC详情
15Winrar CVE exploitation before 7.13 using multiple ADS streams on a single file (Custom PDF implementation)https://github.com/pentestfunctions/best-CVE-2025-8088POC详情
16Nonehttps://github.com/nyra-workspace/CVE-2025-8088POC详情
17A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-EditionPOC详情
18Nonehttps://github.com/walidpyh/CVE-2025-8088POC详情
19Nonehttps://github.com/hexsecteam/CVE-2025-8088-Winrar-ToolPOC详情
20WinRAR CVE-2025-8088 exploit toolhttps://github.com/cozythrill/CVE-2025-8088POC详情
21CVE-2025-8088 path traversal toolhttps://github.com/tartalu/CVE-2025-8088POC详情
22A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lower. This tool creates a malicious RAR archive that embeds payloads in Alternate Data Streams (ADS) with path traversal, potentially leading to arbitrary code execution.https://github.com/techcorp/CVE-2025-8088-ExploitPOC详情
23CVE-2025-8088https://github.com/nhattanhh/CVE-2025-8088POC详情
24Nonehttps://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerabilityPOC详情
25WinRAR漏洞CVE-2025-8088的payload一键生成工具https://github.com/hbesljx/CVE-2025-8088-EXPPOC详情
26CVE-2025-8088 path traversal toolhttps://github.com/Osinskitito499/CVE-2025-8088POC详情
27CVE-2025-8088 path traversal toolhttps://github.com/m4nbun/CVE-2025-8088POC详情
28🚨 Exploit WinRAR CVE-2025-8088 with this PoC RAR archive, demonstrating the vulnerability and its impact when executed on the affected software.https://github.com/pablo388/WinRAR-CVE-2025-8088-PoC-RARPOC详情
29CVE-2025-8088 exploit C++ implhttps://github.com/lucyna77/winrar-exploitPOC详情
30CVE-2025-8088 based path traversal toolhttps://github.com/kyomber/CVE-2025-8088POC详情
31Nonehttps://github.com/Fathi-MO/POC-CVE-2025-8088POC详情
32CVE-2025-8088 based path traversal toolhttps://github.com/haspread/CVE-2025-8088POC详情
33CVE-2025-8088 based path traversal toolhttps://github.com/tookATE/CVE-2025-8088POC详情
34WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/Snorx-cyber/CVE-2025-8088-builderPOC详情
35CVE-2025-8088-BUILDERhttps://github.com/aldisakti2/CVE-2025-8088-BUILDER-Winrar-ToolPOC详情
36path traversal tool based on cve-2025-8088 https://github.com/blowrrr/cve-2025-8088POC详情
37A POC exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lowerhttps://github.com/papcaii2004/CVE-2025-8088-WinRAR-builderPOC详情
38Path traversal tool based on cve-2025-8088 vulnerabilityhttps://github.com/kaucent/CVE-2025-8088POC详情
39path traversal tool based on cve 2025 8088 vurnelabilityhttps://github.com/mocred/cve-2025-8088POC详情
40CVE-2025-8088https://github.com/B1ack4sh/Blackash-CVE-2025-8088POC详情
41Nonehttps://github.com/nuky-alt/CVE-2025-8088POC详情
42Path traversal tool based on cve 2025 8088https://github.com/h4vier/cve-2025-8088POC详情
43Path traversal tool based on cve-2025-8088https://github.com/4daysday/cve-2025-8088POC详情
44CVE-2025-8088https://github.com/Ashwesker/Blackash-CVE-2025-8088POC详情
45Nonehttps://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-ToolkitPOC详情
46🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.https://github.com/Markusino488/cve-2025-8088POC详情
47CVE 2025 8088https://github.com/vitalichkaa/CVE-2025-8088POC详情
48Defensive PowerShell tool for static inspection of RAR archives and detection of CVE-2025-8088 path traversal anomalies.https://github.com/ilhamrzr/RAR-Anomaly-InspectorPOC详情
三、漏洞 CVE-2025-8088 的情报信息
  • 标题: WinRAR News: WinRAR 7.13 Final released -- 🔗来源链接

    标签:

    神龙速读:
                                            ### 关键漏洞信息
    
    - **漏洞类型**: 目录遍历漏洞 (Directory Traversal Vulnerability)
    - **影响版本**: WinRAR 7.12 及之前版本
    - **修复版本**: WinRAR 7.13
    - **漏洞描述**:
      - 在解压缩文件时,之前的WinRAR版本、Windows版本的RAR、UnRAR、便携式UnRAR源代码和UnRAR.dll可以通过在特别制作的存档中定义的路径被欺骗,而不是使用用户指定的路径。
      - Unix版本的RAR、UnRAR、便携式UnRAR源代码和UnRAR库以及Android版RAR不受此安全问题的影响。
    - **发现者**: Anton Cherepanov, Peter Kosinar 和 Peter Strycek from ESET
    
    ### 其他修复内容
    
    - **修复了以下Bug**:
      - WinRAR 7.12 的“从文件导入设置”命令无法恢复由WinRAR 7.12之前版本保存的设置。
      - WinRAR 7.12 设置的压缩配置文件的恢复大小大于指定大小,这些配置文件是由WinRAR 5.21及更早版本创建的。
                                            
    WinRAR News: WinRAR 7.13 Final released
  • https://nvd.nist.gov/vuln/detail/CVE-2025-8088
四、漏洞 CVE-2025-8088 的评论

暂无评论


发表评论