POC详情: 641856864df7ac2e0ba81d93514e1ce1f42e6a3c

来源
关联漏洞
标题: WinRAR 安全漏洞 (CVE-2025-8088)
描述:WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在安全漏洞,该漏洞源于路径遍历问题,可能导致任意代码执行。
描述
CVE-2025-8088 path traversal tool
介绍
# CVE-2025-8088 WinRAR path traversal tool

> **⚠ This tool is created solely for educational use only. Unauthorized use outside of controlled environments is strictly prohibited.**

A Python script that exploits CVE-2025-8088, a path traversal vulnerability in WinRAR, by generating a malicious archive that places executable payloads into the Windows startup folder using multiple relative directory levels to ensure reliable execution regardless of the extraction location

# Requirements
- Windows OS
- Python 3.4+
- Pip
- WinRar

# Features
- **Fully customizable decoy files**
- **Deploys payload to Windows startup for persistence**
- **Hides payload using ADS**
- **Patches RAR headers structure for path injection**
- **Ensures archive integrity by regenerating CRC values**

# How it works? 
1. Creates decoy files
2. Embeds payload streams using multiple levels of path traversal using ADS
3. Modifies archives structure with ADS
4. CRC recalculation
5. Delivers output to Startup

# Configuration⚙
Configure the config.py file
```python
# Configuration
DECOY_FILE_NAME = "document"
DROP_PATH = "AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\payload.bat"
PAYLOAD = "@echo off\nstart /B C:\Users\Public\file.exe\n"
```
To use your own decoy file, type its full path instead of name.

# Run💨
Run the script:
```shell
python CVE-2025-8088.py
```
The output will appear in the output folder.

# Disclaimer
This tool is created solely for educational use only. Unauthorized use outside of controlled environments is strictly prohibited.




文件快照

[4.0K] /data/pocs/641856864df7ac2e0ba81d93514e1ce1f42e6a3c ├── [ 209] config.py ├── [2.8K] CVE-2025-8088.py ├── [4.1K] extract.py ├── [4.0K] output └── [1.5K] README.md 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。