支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 7464bc49c19faba38b44d969c7efbfc440d78a11

来源
关联漏洞
标题:WinRAR 安全漏洞 (CVE-2025-8088)
描述:WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在安全漏洞,该漏洞源于路径遍历问题,可能导致任意代码执行。
描述
CVE-2025-8088
介绍
# 🧩 CVE-2025-8088 — WinRAR Zero-Day Vulnerability

**Type:** Path Traversal / Arbitrary File Write → Code Execution
**Severity:** High (CVSS 8.4)
**Status:** Actively Exploited (Zero-Day)
**Discovered:** July 2025
**Fixed in:** WinRAR 7.13
**Researchers:** Anton Cherepanov, Peter Košinár, Peter Strýček (ESET)

---

## 🧠 Executive Summary

A critical vulnerability, **CVE-2025-8088**, affects **WinRAR ≤ 7.12** on Windows.
It allows **path traversal via alternate data streams (ADS)** in crafted archives.
Attackers can silently extract files into system directories, planting payloads that execute at startup — achieving **remote code execution** upon user interaction.

Exploitation was observed *in the wild* before disclosure, primarily through **phishing campaigns** distributing malicious `.rar` files disguised as benign documents.

---

## ⚙️ Technical Breakdown

| Category                | Details                                                                      |
| :---------------------- | :--------------------------------------------------------------------------- |
| **Vulnerability Type**  | Path Traversal / Directory Traversal using ADS                               |
| **Root Cause**          | Improper validation of extraction paths when processing crafted RAR archives |
| **Attack Vector**       | User opens or extracts a malicious archive using WinRAR ≤ 7.12               |
| **Privileges Required** | User-level                                                                   |
| **User Interaction**    | Required (manual extraction)                                                 |
| **Impact**              | Arbitrary file write → persistence → remote code execution                   |
| **Patched Version**     | WinRAR 7.13 (July 30 2025 release)                                           |
| **CVSS Score**          | 8.4 / 10 — High                                                              |

---

## 🧬 Exploitation Methodology

1. **Delivery:**
   Victim receives a phishing email (often themed as HR or résumé content) with a `.rar` attachment.

2. **Trigger:**
   User opens the archive using a vulnerable WinRAR version.

3. **Exploit Action:**
   Malicious archive entries contain traversal paths like `..\..\..\` combined with ADS syntax (`::$DATA`) — tricking WinRAR into writing payloads outside the intended extraction folder.

4. **Payload Deployment:**
   Files such as `.lnk`, `.dll`, or `.exe` are dropped into:

   * `%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup`
   * `%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup`

5. **Execution:**
   Upon system restart or user login, the dropped payload automatically executes.

---

## ⚡ Configuration

```python
# Configuration
DECOY_FILE_NAME = "document"
DROP_PATH = "AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\payload.bat"
PAYLOAD = "@echo off\nstart /B C:\Users\Public\file.exe\n"
```
To use your own decoy file, type its full path instead of name.

## 💥 Run

Run the script:

```python
python main.py
```

The output will appear in the output folder.

---

## 🕵️ Threat Landscape

### ⚔️ Primary Actor: **RomCom** (a.k.a. Storm-0978 / UNC2596 / Tropical Scorpius)

* Advanced persistent threat group with history of zero-day use.
* Active phishing operations July 18 – 21 2025.
* Targets: defense, logistics, manufacturing, finance, and government sectors.
* Known payloads: **SnipBot**, **RustyClaw**, **Mythic agent**.
* Example observed malicious file: `msedge.dll`.

### 🐺 Secondary Actor: **Paper Werewolf**

* Deployed the same exploit primarily against Russian organizations.
* Likely obtained the exploit from a third-party seller (~ $80,000 underground value).

---

## 🔍 Indicators of Compromise (IoCs)

> *Note: Hashes and domains vary per campaign — below are structural & behavioral indicators observed.*

**File System Artifacts**

* Unexpected `.lnk` files in user or system startup folders
* `msedge.dll` or other suspicious DLLs under `%TEMP%`, `%LOCALAPPDATA%`
* Recently created executables in `C:\Users\<user>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup`

**Registry Persistence**

* New or modified keys under:
  `HKCU\Software\Microsoft\Windows\CurrentVersion\Run`
  `HKLM\Software\Microsoft\Windows\CurrentVersion\Run`

**Network Indicators**

* Outbound connections to unknown C2 domains (TLS-encrypted, beaconing behavior)
* Occasional staging via public cloud or document-sharing services

**Behavioral Indicators**

* Archive extraction unexpectedly writes to non-selected paths
* Newly spawned processes post-extraction (especially DLL loads from user directories)

---

## 🧩 Risk Assessment

| Impact Area          | Description                                                    |
| :------------------- | :------------------------------------------------------------- |
| **Confidentiality**  | Compromised through credential theft or data exfiltration      |
| **Integrity**        | Unauthorized persistence, alteration of system files           |
| **Availability**     | Potential disruption or ransomware deployment                  |
| **Likelihood**       | High — widespread WinRAR installations and delayed patching    |
| **Exploit Maturity** | Mature — weaponized in phishing campaigns before patch release |

---

## 🛡 Mitigation Strategy

### 1. **Immediate Actions**

* **Update WinRAR** to version 7.13 or later on all Windows systems.
* If you use tools embedding **UnRAR.dll** or **UnRAR source code**, recompile or patch them.

### 2. **System Hardening**

* Restrict write permissions to startup directories.
* Block WinRAR extractions to system or shared folders.
* Use EDR policies to alert on suspicious file writes involving path traversal.

### 3. **User Defense**

* Reinforce awareness training: never open unsolicited RAR attachments.
* Disable automatic “open archive after extraction.”
* Utilize sandbox analysis for inbound attachments.

### 4. **Threat Hunting**

* Search for `.lnk`, `.dll`, `.exe` files created after July 2025 in startup folders.
* Examine system logs for WinRAR extraction anomalies.
* Monitor outbound network connections from unknown binaries.

### 5. **Incident Response**

* If compromise is suspected:

  * Isolate the host.
  * Acquire forensic images (memory + disk).
  * Analyze persistence mechanisms.
  * Remove artifacts and reimage if integrity is uncertain.

---

## 🔮 Lessons Learned

* Even legacy utilities like **WinRAR**, widely used across industries, remain lucrative attack vectors when update mechanisms are manual.
* Security teams should treat **archive tools** as potential attack surfaces, not merely utilities.
* Continuous patching, email filtering, and behavioral monitoring are essential to reduce exposure to such zero-day exploits.

---

## 🧾 Summary Table

| Element                 | Detail                                            |
| :---------------------- | :------------------------------------------------ |
| **CVE ID**              | CVE-2025-8088                                     |
| **Severity**            | High (8.4 / 10)                                   |
| **Impact**              | Code execution via path traversal in RAR archives |
| **Affected Versions**   | WinRAR ≤ 7.12                                     |
| **Fixed Version**       | 7.13                                              |
| **Discovered by**       | ESET Research                                     |
| **Exploited by**        | RomCom, Paper Werewolf                            |
| **Exploit Method**      | ADS + path traversal during archive extraction    |
| **Delivery Vector**     | Phishing with malicious RAR attachments           |
| **Patch Release**       | July 30 2025                                      |
| **Mitigation Priority** | Critical / Immediate                              |

---

## 🧩 Quick Defensive Checklist

✅ Update to WinRAR 7.13+
✅ Block startup folder writes from untrusted apps
✅ Hunt for `msedge.dll`, `.lnk` persistence artifacts
✅ Educate users about malicious RAR attachments
✅ Review EDR detections for new DLL loads or abnormal extraction paths

---

文件快照

[4.0K] /data/pocs/7464bc49c19faba38b44d969c7efbfc440d78a11 ├── [ 202] config.py ├── [1.4K] extract.py ├── [4.3K] main.py └── [8.1K] README.md 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。