Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38831 PoC — WinRAR 安全漏洞

Source
Associated Vulnerability
Title:WinRAR 安全漏洞 (CVE-2023-38831)
Description:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
Readme
# CVE-2023-38831 PoC
This is an easy to use exploit for the `CVE-2023-38831`

## Usage
Check vulnerable versions:

![](version.png)

Run the exploit:

![](poc.png)

![](poc1.png)

Get the shell:

![](shell.png)
File Snapshot

[4.0K] /data/pocs/595049a05c02cbfd24ca228e3b0b9e5e425188ec ├── [ 0] document.pdf ├── [131K] poc1.png ├── [ 13K] poc.png ├── [1.3K] poc.py ├── [ 211] README.md ├── [ 58] script.bat ├── [ 21K] shell.png └── [ 92K] version.png 0 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.