POC详情: 0c5bc81796b3df215699bf74662f7121de804bf0

来源
关联漏洞
标题: WinRAR 安全漏洞 (CVE-2023-38831)
描述:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
描述
This is my malware
介绍
# VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

This is my malware.

I use the CVE 2023-38831, a kind of exploit on WinRAR, to do this malware.

I also use BypassUAC to get Administrator authority.

This is the OVA file of it: [https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/EW7BTI5OBylGjfoxQEkpA6YBrAzL1tMiGkcDzo5EYQxHjw](https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/Ea5fsrEHgBxBsYl40m0QfJ4BJWWFfqXGJB3vQBtqsH86gA?e=tktgkz)


# Disclaimer
I make this malware just want to show the CVE 2023-38831 and bypass-UAC. Please don't use this to do something illegal.

If you do it, I'm not responsible for this. Thank you.

# Reference

https://github.com/HDCE-inc/CVE-2023-38831

https://blog.csdn.net/qq_17550379/article/details/79006718

文件快照

[4.0K] /data/pocs/0c5bc81796b3df215699bf74662f7121de804bf0 ├── [ 0] document.pdf ├── [1.3K] exploit.py ├── [1.0K] LICENSE ├── [ 799] README.md ├── [ 200] squid.bat ├── [ 520] volleyball.rar ├── [2.9K] volleyballsquid.py ├── [6.4M] volleysquid.exe └── [4.5M] WinRAR.zip 0 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。