CVE-2018-20250

HIGH KEV RANSOMWARE

WinRAR <5.61 - Path Traversal

Title source: llm

Description

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.

Exploits (24)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/46756
exploitdb WORKING POC VERIFIED
by WyAtu · pythonlocalwindows
https://www.exploit-db.com/exploits/46552
nomisec WORKING POC 495 stars
by WyAtu · client-side
https://github.com/WyAtu/CVE-2018-20250
nomisec WORKING POC 26 stars
by QAX-A-Team · poc
https://github.com/QAX-A-Team/CVE-2018-20250
nomisec WORKING POC 21 stars
by easis · client-side
https://github.com/easis/CVE-2018-20250-WinRAR-ACE
nomisec WORKING POC 7 stars
by arkangel-dev · poc
https://github.com/arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI
nomisec WORKING POC 2 stars
by Ektoplasma · client-side
https://github.com/Ektoplasma/ezwinrar
nomisec WORKING POC 2 stars
by STP5940 · client-side
https://github.com/STP5940/CVE-2018-20250
nomisec WORKING POC 1 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2018-20250-WinRAR
nomisec WORKING POC 1 stars
by technicaldada · client-side
https://github.com/technicaldada/hack-winrar
gitlab WORKING POC
by gavz · client-side
https://gitlab.com/gavz/CVE-2018-20250-WinRAR-ACE
nomisec WORKING POC
by LamSonBinh · client-side
https://github.com/LamSonBinh/CVE-2018-20250
nomisec WORKING POC
by tannlh · client-side
https://github.com/tannlh/CVE-2018-20250
nomisec WORKING POC
by tzwlhack · client-side
https://github.com/tzwlhack/CVE-2018-20250
nomisec WORKING POC
by zeronohacker · poc
https://github.com/zeronohacker/CVE-2018-20250
nomisec STUB
by lxg5763 · poc
https://github.com/lxg5763/cve-2018-20250
nomisec WORKING POC
by likekabin · poc
https://github.com/likekabin/CVE-2018-20250
nomisec WORKING POC
by H4xl0r · remote
https://github.com/H4xl0r/WinRar_ACE_exploit_CVE-2018-20250
nomisec SCANNER
by joydragon · poc
https://github.com/joydragon/Detect-CVE-2018-20250
nomisec WORKING POC
by AeolusTF · client-side
https://github.com/AeolusTF/CVE-2018-20250
nomisec WRITEUP
by blunden · poc
https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250
nomisec WRITEUP
by nmweizi · poc
https://github.com/nmweizi/CVE-2018-20250-poc-winrar
metasploit WORKING POC EXCELLENT
by Nadav Grossman, Imran E. Dawoodjee <[email protected]> · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_ace.rb

Scores

CVSS v3 7.8
EPSS 0.9346
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-02-15
VulnCheck KEV 2019-02-28
InTheWild.io 2022-02-15
ENISA EUVD EUVD-2018-12813
Ransomware Use Confirmed
CWE
CWE-22 CWE-36
Status published
Products (1)
rarlab/winrar < 5.61
Published Feb 05, 2019
KEV Added Feb 15, 2022
Tracked Since Feb 18, 2026