Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-38831

Description

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

POC

Reference

- http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html

- https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/

Github

- https://github.com/0day404/HV-2024-POC

- https://github.com/0xMarcio/cve

- https://github.com/12442RF/POC

- https://github.com/80r1ng/CVE-2023-38831-EXP

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/AboSteam/POPC

- https://github.com/Ahmed1Al/CVE-2023-38831-winrar-exploit

- https://github.com/Andromeda254/cve

- https://github.com/Antix28/cybersecurity-labs-log

- https://github.com/AskarKasimov/1337Rpwn4

- https://github.com/Awrrays/Pentest-Tips

- https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar

- https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar

- https://github.com/BeniBeastt/CVE-2023-38831_ReverseShell_Winrar

- https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections

- https://github.com/DMW11525708/wiki

- https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit

- https://github.com/FirFirdaus/CVE-2023-38831

- https://github.com/FlyingPeg/Redteam_Havoc_C2_Framework_Report

- https://github.com/GOTonyGO/CVE-2023-38831-winrar

- https://github.com/Garck3h/cve-2023-38831

- https://github.com/GhostTroops/TOP

- https://github.com/Ghostasky/ALLStarRepo

- https://github.com/HACK-THE-WORLD/DailyMorningReading

- https://github.com/HDCE-inc/CVE-2023-38831

- https://github.com/HarryLee02/DLL-sideloading-Worm

- https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784

- https://github.com/IMHarman/CVE-2023-38831

- https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT

- https://github.com/K3rnel-Dev/WinrarExploit

- https://github.com/Kreedman05/nto_4fun_2024

- https://github.com/Lern0n/Lernon-POC

- https://github.com/Levy-Dor/SpottedInTheWild

- https://github.com/Linxloop/fork_POC

- https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection

- https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE

- https://github.com/Malwareman007/CVE-2023-38831

- https://github.com/MaorBuskila/Windows-X64-RAT

- https://github.com/Marco-zcl/POC

- https://github.com/Mich-ele/CVE-2023-38831-winrar

- https://github.com/Michael-Meade/Links-Repository

- https://github.com/Mitan101/BTL-KTXN

- https://github.com/MoazAlHossary/MoazAlHossary

- https://github.com/MoazElssayed/MoazElsayed

- https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC

- https://github.com/Moros-td/-AUTOMATED-DETECTION-AND-RESPONSE-TO-INFORMATION-SYSTEM-SECURITY-INCIDENTS

- https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection

- https://github.com/MyStuffYT/CVE-2023-38831-POC

- https://github.com/Nielk74/CVE-2023-38831

- https://github.com/NinVoido/nto2024-p7d-writeups

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PascalAsch/CVE-2023-38831-KQL

- https://github.com/PudgyDragon/IOCs

- https://github.com/RomainBayle08/CVE-2023-38831

- https://github.com/RonF98/CVE-2023-38831-POC

- https://github.com/SpamixOfficial/CVE-2023-38831

- https://github.com/Sploitus/CVE-2024-29988-exploit

- https://github.com/SugiB3o/Keylog_CVE2023-38831

- https://github.com/T0ngMystic/Vulnerability_List

- https://github.com/Threekiii/CVE

- https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution

- https://github.com/TranKuBao/winrar_CVE2023-38831

- https://github.com/UnHackerEnCapital/PDFernetRemotelo

- https://github.com/VictoriousKnight/CVE-2023-38831_Exploit

- https://github.com/Warren-Jace/poc-doc

- https://github.com/WhosGa/MyWiki

- https://github.com/Yuan08o/pocs

- https://github.com/ZonghaoLi777/githubTrending

- https://github.com/admin772/POC

- https://github.com/adminlove520/pocWiki

- https://github.com/adysec/POC

- https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc

- https://github.com/akhomlyuk/cve-2023-38831

- https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit

- https://github.com/an040702/CVE-2023-38831

- https://github.com/aneasystone/github-trending

- https://github.com/asepsaepdin/CVE-2023-38831

- https://github.com/b1ank1108/awesome-stars

- https://github.com/b1tg/CVE-2023-38831-winrar-exploit

- https://github.com/b1tg/b1tg

- https://github.com/c0mrade12211/Pentests

- https://github.com/cisp-pte/POC-20241008-sec-fork

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/deepinstinct/UAC-0099-Targeting_UA

- https://github.com/delivr-to/detections

- https://github.com/dre4ft/Edu_RW

- https://github.com/eeeeeeeeee-code/POC

- https://github.com/elefantesagradodeluzinfinita/cve-2023-38831

- https://github.com/elefantesagradodeluzinfinita/elefantesagradodeluzinfinita

- https://github.com/g3co2/nto2024

- https://github.com/grain-ahrok/ransomeware

- https://github.com/greenberglinken/2023hvv_1

- https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831

- https://github.com/hktalent/TOP

- https://github.com/idkwastaken/CVE-2023-38831

- https://github.com/iemotion/POC

- https://github.com/ignis-sec/CVE-2023-38831-RaRCE

- https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831

- https://github.com/ismailmazumder/SL7CVELabsBuilder

- https://github.com/johe123qwe/github-trending

- https://github.com/kehrijksen/CVE-2023-38831

- https://github.com/khanhtranngoccva/cve-2023-38831-poc

- https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831

- https://github.com/kun-g/Scraping-Github-trending

- https://github.com/kuyrathdaro/winrar-cve-2023-38831

- https://github.com/laoa1573/wy876

- https://github.com/macarell228/nto2024

- https://github.com/malvika-thakur/CVE-2023-38831

- https://github.com/maximxlss/nto-2024-xls-team

- https://github.com/mkonate19/POC-WINRAR

- https://github.com/mrlyn2k3/Project-1

- https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc

- https://github.com/nhman-python/CVE-2023-38831

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oLy0/Vulnerability

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/r1yaz/r1yaz

- https://github.com/r1yaz/winDED

- https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831

- https://github.com/ruycr4ft/CVE-2023-38831

- https://github.com/s4m98/winrar-cve-2023-38831-poc-gen

- https://github.com/sadnansakin/Winrar_0-day_RCE_Exploitation

- https://github.com/securelayer7/CVE-Analysis

- https://github.com/securelayer7/Research

- https://github.com/sh770/CVE-2023-38831

- https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

- https://github.com/swiftiebee/nto2024

- https://github.com/takinrom/nto2024-user4-report

- https://github.com/tanjiti/sec_profile

- https://github.com/tanwar29/CVE

- https://github.com/technicalcorp0/CVE-2023-38831-Exploit

- https://github.com/thegr1ffyn/CVE-2023-38831

- https://github.com/tim-barc/ctf_writeups

- https://github.com/uixss/TriniRar

- https://github.com/vien2024/NT230-project

- https://github.com/wjlin0/poc-doc

- https://github.com/wooluo/POC00

- https://github.com/wy876/POC

- https://github.com/xaitax/WinRAR-CVE-2023-38831

- https://github.com/xingchennb/POC-

- https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial

- https://github.com/yezzfusl/cve_2023_38831_scanner

- https://github.com/yj94/Yj_learning

- https://github.com/youmulijiang/evil-winrar

- https://github.com/z3r0sw0rd/CVE-2023-38831-PoC

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zulloper/cve-poc