Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38831 PoC — WinRAR 安全漏洞

Source
Associated Vulnerability
Title:WinRAR 安全漏洞 (CVE-2023-38831)
Description:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
Description
This is my malware
Readme
# VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

This is my malware.

I use the CVE 2023-38831, a kind of exploit on WinRAR, to do this malware.

I also use BypassUAC to get Administrator authority.

This is the OVA file of it: [https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/EW7BTI5OBylGjfoxQEkpA6YBrAzL1tMiGkcDzo5EYQxHjw](https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/Ea5fsrEHgBxBsYl40m0QfJ4BJWWFfqXGJB3vQBtqsH86gA?e=tktgkz)


# Disclaimer
I make this malware just want to show the CVE 2023-38831 and bypass-UAC. Please don't use this to do something illegal.

If you do it, I'm not responsible for this. Thank you.

# Reference

https://github.com/HDCE-inc/CVE-2023-38831

https://blog.csdn.net/qq_17550379/article/details/79006718

File Snapshot

[4.0K] /data/pocs/0c5bc81796b3df215699bf74662f7121de804bf0 ├── [ 0] document.pdf ├── [1.3K] exploit.py ├── [1.0K] LICENSE ├── [ 799] README.md ├── [ 200] squid.bat ├── [ 520] volleyball.rar ├── [2.9K] volleyballsquid.py ├── [6.4M] volleysquid.exe └── [4.5M] WinRAR.zip 0 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.