POC详情: ef949bdcf99cbaf0dead934330b9913f37910181

来源
关联漏洞
标题: WinRAR 安全漏洞 (CVE-2023-38831)
描述:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
描述
CVE-2023-38831 winrar exploit builder
介绍
# CVE-2023-38831 Builder

Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.

I created this exploit builder mainly to learn rust language, so don't expect to find clean and optimized code.


![CMD](https://github.com/Mich-ele/CVE-2023-38831-winrar/blob/main/images/cmd.png?raw=true)

![Winrar](https://github.com/Mich-ele/CVE-2023-38831-winrar/blob/main/images/winrar.png?raw=true)


### Info about this vulnerability
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
文件快照

[4.0K] /data/pocs/ef949bdcf99cbaf0dead934330b9913f37910181 ├── [ 191] Cargo.toml ├── [4.0K] images │   ├── [140K] cmd.png │   └── [ 46K] winrar.png ├── [ 469] OUTPUT.rar ├── [ 530] README.md ├── [ 144] script.bat ├── [4.0K] src │   └── [4.0K] main.rs └── [ 12] test.txt 2 directories, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。