POC详情: c8d268ef3d7a4ae2081ebe38bea3d2bcb111c46a

来源
关联漏洞
标题: WinRAR 安全漏洞 (CVE-2023-38831)
描述:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
描述
CVE-2023-38831 winrar exploit generator and get reverse shell
介绍
# CVE-2023-38831-winrar-expoit-simple-Poc

## Very important
I hope you see this link first [https://github.com/b1tg/CVE-2023-38831-winrar-exploit]

I did not write the full exploit. *He wrote the exploit*. [https://github.com/b1tg]

All he did was modify something simple to get a Reverse Shell through the script.bat file

## How To Run
`python cve-2023-38831-exp-gen.py <file name pdf,png,jpg> <script.bat> <output file name>`

*Don't forget change value ip and port*

use any file pdf , png or jpg 


### POC File .pdf


https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc/assets/64432235/052eac7c-d25f-4873-af68-3bbfbf7e4cce



### POC File .png
*Don't forget change file name in **script.bat***


https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc/assets/64432235/36a8be86-f495-4ee6-a2df-f6b7b77910c0





# Reference

https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/

https://thehackernews.com/2023/08/winrar-security-flaw-exploited-in-zero.html

https://github.com/b1tg/CVE-2023-38831-winrar-exploit
文件快照

[4.0K] /data/pocs/c8d268ef3d7a4ae2081ebe38bea3d2bcb111c46a ├── [1.5K] cve-2023-38831-exp-gen.py ├── [1.0K] README.md └── [ 926] script.bat 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。