Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-38831 PoC — WinRAR 安全漏洞

Source
Associated Vulnerability
Title:WinRAR 安全漏洞 (CVE-2023-38831)
Description:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
Description
CVE-2023-38831 is an RCE in WinRAR (<6.23)
Readme
# CVE-2023-38831
CVE-2023-38831 is an RCE in WinRAR (&lt;6.23)

Reference by https://github.com/z3r0sw0rd/CVE-2023-38831-PoC

Read up by Google's TAG at:
https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/

Download the latest vulnerable version: 6.22 for Windows x64 at:
https://www.win-rar.com/fileadmin/winrar-versions/winrar/winrar-x64-622.exe

## Getting started:
`python poc.py .\script.bat .\pepe.jpg`
File Snapshot

[4.0K] /data/pocs/c974a2d14ab54fd6d708b529826ec746982ce584 ├── [ 12K] pepe.jpg ├── [2.3K] poc.py ├── [ 457] README.md └── [ 356] script.bat 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.