关联漏洞
介绍
# CVE-2023-38831 winrar exploit generator
## Quick poc test
Generate the default poc for test
```
python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat poc.rar
```
## Custom
1. Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (.png, jpg) or a document (.pdf)
2. Run `python cve-2023-38831-exp-gen.py <bait name> <script name> <output name>` to generate your exploit
## Screenshots
Infected version: winrar <= 6.22

## Analysis Blog
https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/
## Reference
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
文件快照
[4.0K] /data/pocs/6599c711061c757cbbd877b7341292941e1a0f0d
├── [180K] CLASSIFIED_DOCUMENTS.pdf
├── [1.5K] cve-2023-38831-exp-gen.py
├── [175K] CVE-2023-38831-poc.rar
├── [199K] demo.png
├── [ 720] README.md
└── [ 45] script.bat
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。