nomisec
WORKING POC
788 stars
by b1tg · client-side
https://github.com/b1tg/CVE-2023-38831-winrar-exploit
This repository contains a functional exploit generator for CVE-2023-38831, a WinRAR vulnerability that allows arbitrary code execution via crafted archive files. The script creates a malicious RAR archive that exploits the vulnerability by manipulating file extensions and directory structures.
Classification
Working Poc 95%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
WinRAR version <= 6.22 · Victim interaction to open the malicious archive
nomisec
WORKING POC
129 stars
by Garck3h · client-side
https://github.com/Garck3h/cve-2023-38831
This Go-based tool generates a malicious ZIP file exploiting CVE-2023-38831 in WinRAR by manipulating file extensions and embedding a payload. It creates a crafted archive that, when extracted, executes arbitrary commands due to improper path sanitization.
Classification
Working Poc 95%
Target:
WinRAR <6.23
No auth needed
Prerequisites:
Victim must extract the crafted ZIP file using vulnerable WinRAR version
nomisec
WORKING POC
115 stars
by ignis-sec · client-side
https://github.com/ignis-sec/CVE-2023-38831-RaRCE
This repository contains a functional exploit generator for CVE-2023-38831, which leverages a path traversal vulnerability in WinRAR to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The tool creates a malicious archive that replaces the benign file with a payload upon double-click.
Classification
Working Poc 95%
Target:
WinRAR versions before 6.23
No auth needed
Prerequisites:
A benign file to use as bait · A payload file to execute
nomisec
WORKING POC
94 stars
by BoredHackerBlog · client-side
https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc
This repository provides a lazy proof-of-concept for CVE-2023-38831, a WinRAR vulnerability. It includes a modified RAR file and instructions to create a malicious file named 'ReadMe.txt .cmd' to exploit the vulnerability.
Classification
Working Poc 90%
Target:
WinRAR 5.91.0
No auth needed
Prerequisites:
WinRAR 5.91.0 installed · User interaction to open the malicious RAR file
nomisec
WORKING POC
89 stars
by HDCE-inc · client-side
https://github.com/HDCE-inc/CVE-2023-38831
The repository contains a functional exploit for CVE-2023-38831, which leverages a vulnerability in WinRAR's handling of ZIP archives with similarly named files and folders to achieve arbitrary code execution. The exploit generates a malicious RAR file by embedding a script in a folder with a name similar to a benign file, tricking users into executing the script when accessing the benign file.
Classification
Working Poc 95%
Target:
WinRAR versions before 6.23
No auth needed
Prerequisites:
Benign file (e.g., PDF) and a script file (e.g., CMD) to embed in the archive
nomisec
WRITEUP
40 stars
by knight0x07 · poc
https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
This repository provides a detailed technical overview of CVE-2023-38831, a WinRAR code execution vulnerability. It explains the exploit mechanism involving a weaponized ZIP archive with specific file naming conventions and includes process tree analysis for detection purposes.
Classification
Writeup 90%
Target:
WinRAR (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable version of WinRAR · Specially crafted ZIP archive with specific file naming conventions
nomisec
WORKING POC
22 stars
by Maalfer · client-side
https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE
This repository contains a functional exploit for CVE-2023-38831, a WinRAR vulnerability, which generates a malicious RAR archive to achieve remote code execution (RCE) via a reverse shell. The exploit leverages the 'rarce' tool to create a bait file that, when executed, triggers a PowerShell reverse shell payload.
Classification
Working Poc 95%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Victim must open the malicious RAR archive and execute the bait file · Attacker must have a listener (e.g., netcat) set up to receive the reverse shell
nomisec
WORKING POC
15 stars
by xaitax · client-side
https://github.com/xaitax/WinRAR-CVE-2023-38831
This repository contains a functional Metasploit module that exploits CVE-2023-38831 in WinRAR 6.22. The exploit crafts a malicious RAR file embedding a decoy document and a payload, which executes when the user opens the decoy.
Classification
Working Poc 100%
Target:
WinRAR 6.22
No auth needed
Prerequisites:
Metasploit framework · decoy file (PDF, JPG, etc.)
nomisec
WORKING POC
13 stars
by MorDavid · client-side
https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC
This repository contains a functional exploit generator for CVE-2023-38831, which leverages a directory traversal vulnerability in WinRAR to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The script automates the creation of a malicious ZIP file by embedding a payload and bait file, exploiting the way WinRAR processes folder names with the same name as the benign file.
Classification
Working Poc 95%
Target:
WinRAR before 6.23
No auth needed
Prerequisites:
A benign bait file (e.g., PDF) · A payload file (e.g., CMD, BAT, or EXE) · A URL to fetch additional payloads
nomisec
WORKING POC
11 stars
by ahmed-fa7im · poc
https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc
This repository contains a functional exploit for CVE-2023-38831, a WinRAR vulnerability that allows arbitrary code execution via crafted archive files. The script generates a malicious RAR file that exploits the vulnerability by embedding a batch script disguised as a legitimate file extension.
Classification
Working Poc 95%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
Victim must open the malicious RAR file · WinRAR must be installed on the victim's system
nomisec
WORKING POC
10 stars
by youmulijiang · client-side
https://github.com/youmulijiang/evil-winrar
This repository contains a functional exploit framework for CVE-2023-38831, a WinRAR vulnerability, which includes payload generation, email sending, and HTTP server functionality for social engineering attacks. The code demonstrates the ability to craft malicious RAR archives that exploit the vulnerability.
Classification
Working Poc 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Victim interaction to open malicious RAR file · Python environment for exploit generation
nomisec
WORKING POC
9 stars
by Malwareman007 · client-side
https://github.com/Malwareman007/CVE-2023-38831
This Python script generates a 'bait and switch' archive by embedding a malicious script within a seemingly legitimate file, exploiting CVE-2023-38831. It manipulates ZIP archive contents to disguise the malicious payload, which can be executed upon extraction.
Classification
Working Poc 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
WinRAR installation vulnerable to CVE-2023-38831 · User interaction to extract and open the archive
nomisec
WORKING POC
6 stars
by z3r0sw0rd · client-side
https://github.com/z3r0sw0rd/CVE-2023-38831-PoC
This repository contains a functional PoC for CVE-2023-38831, a WinRAR vulnerability allowing arbitrary code execution via a crafted ZIP archive with a benign file and a folder of the same name. The PoC generates a malicious ZIP file that exploits the vulnerability when the benign file is accessed.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Vulnerable WinRAR version (< 6.23) · Benign file (e.g., .jpg, .png, .pdf) · Malicious script (e.g., .bat)
nomisec
WORKING POC
4 stars
by xk-mt · client-side
https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial
This repository contains a functional exploit PoC for CVE-2023-38831, a WinRAR vulnerability that allows arbitrary code execution via a crafted ZIP archive. The Python script generates a malicious archive that exploits the vulnerability by manipulating file extensions and directory structures.
Classification
Working Poc 90%
Target:
WinRAR <6.23 or WinRAR <=6.22
No auth needed
Prerequisites:
Python environment · WinRAR vulnerable version installed on target system
nomisec
WORKING POC
4 stars
by UnHackerEnCapital · client-side
https://github.com/UnHackerEnCapital/PDFernetRemotelo
This repository contains a functional exploit PoC that chains CVE-2024-4367 (PDF-based RCE) and CVE-2023-38831 (WinRAR path traversal) to achieve remote command execution via a malicious PDF and RAR archive. The script generates a malicious PDF that triggers a download of a crafted RAR file, which executes a reverse shell when extracted.
Classification
Working Poc 95%
Target:
Firefox < 126, WinRAR < 6.23
No auth needed
Prerequisites:
Victim must open the malicious PDF in a vulnerable version of Firefox · Victim must extract the crafted RAR file using a vulnerable version of WinRAR · Attacker must host the malicious files on a reachable server
nomisec
WRITEUP
4 stars
by PascalAsch · poc
https://github.com/PascalAsch/CVE-2023-38831-KQL
This repository provides a detailed technical analysis and KQL query for detecting CVE-2023-38831, a WinRAR file extension spoofing vulnerability. It includes detection logic, IOCs, and references to external PoC tools but does not contain functional exploit code.
Classification
Writeup 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Victim interaction to open a malicious archive · WinRAR installed on the target system
nomisec
WORKING POC
3 stars
by ameerpornillos · client-side
https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit
This PoC exploits CVE-2023-38831 in WinRAR by crafting a malicious RAR archive that leverages a directory traversal vulnerability to execute arbitrary commands when the archive is opened. The script manipulates file extensions and directory structures to bypass WinRAR's security checks.
Classification
Working Poc 95%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
WinRAR installed on the target system · User interaction to open the malicious archive
nomisec
WORKING POC
3 stars
by Mich-ele · client-side
https://github.com/Mich-ele/CVE-2023-38831-winrar
This repository contains a functional exploit builder for CVE-2023-38831, a WinRAR vulnerability affecting versions before 6.23. The Rust-based tool automates the creation of a malicious RAR archive by embedding a script file and manipulating file extensions to trigger the vulnerability.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Victim interaction to open the malicious RAR file · Script file (e.g., CMD) to embed in the archive
nomisec
WORKING POC
3 stars
by akhomlyuk · client-side
https://github.com/akhomlyuk/cve-2023-38831
This repository contains a functional exploit for CVE-2023-38831, a vulnerability in WinRAR <= 6.22 that allows arbitrary code execution via a crafted archive. The PoC script generates a malicious ZIP file that exploits the vulnerability by manipulating file extensions and directory structures.
Classification
Working Poc 95%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
A legitimate file (e.g., PDF, PNG) and a payload file (e.g., batch script)
nomisec
WORKING POC
3 stars
by malvika-thakur · dos
https://github.com/malvika-thakur/CVE-2023-38831
This repository contains a functional PoC for CVE-2023-38831, a WinRAR vulnerability that allows arbitrary code execution by exploiting how WinRAR processes ZIP archives with a benign file and a folder of the same name. The PoC generates a malicious ZIP archive that, when opened, executes a script when the user attempts to access the benign file.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Vulnerable version of WinRAR installed · Benign file (e.g., .jpg, .png, .pdf) · Malicious script (e.g., .bat)
nomisec
WORKING POC
2 stars
by kuyrathdaro · local
https://github.com/kuyrathdaro/cve-2023-38831
This repository contains a functional Python script that exploits CVE-2023-38831 in WinRAR versions < 6.23 by crafting a malicious RAR archive (ZIP with .rar extension) that executes a payload when a user opens the archive and interacts with a decoy file.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Vulnerable WinRAR version (< 6.23) · User interaction (opening archive and clicking decoy file)
nomisec
WORKING POC
2 stars
by r1yaz · client-side
https://github.com/r1yaz/winDED
This repository contains a functional Python exploit for CVE-2023-38831, which leverages WinRAR's improper handling of file extensions in ZIP archives to achieve arbitrary code execution. The exploit crafts a malicious archive that, when extracted, executes a batch script disguised as a PDF file due to a logic flaw in WinRAR's extraction process.
Classification
Working Poc 95%
Target:
WinRAR version 6.21.0
No auth needed
Prerequisites:
WinRAR version 6.21.0 installed on the target system · Victim interaction to open the malicious archive and click the disguised file
nomisec
WORKING POC
2 stars
by MaorBuskila · poc
https://github.com/MaorBuskila/Windows-X64-RAT
This repository contains a Python script that dynamically generates PIC (Position Independent Code) null-free Windows x64 TCP reverse shell shellcode. The script uses the Keystone engine for assembly and provides options to output shellcode in various formats (Python, C, C#, PowerShell).
Classification
Working Poc 95%
Target:
Windows x64 systems (tested on Windows 11, Windows Server 2022, Windows Server 2019)
No auth needed
Prerequisites:
Keystone engine for assembly · Network connectivity to attacker-controlled IP and port
nomisec
WORKING POC
2 stars
by RonF98 · client-side
https://github.com/RonF98/CVE-2023-38831-POC
The repository contains a functional Python script that exploits CVE-2023-38831 in WinRAR versions prior to 6.23 by crafting a malicious RAR archive with ambiguous filenames, leading to arbitrary code execution when the decoy file is opened.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Victim must open the malicious RAR archive and interact with the decoy file
nomisec
SCANNER
2 stars
by IR-HuntGuardians · poc
https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT
This PowerShell script scans the TEMP directory for WinRAR-related folders and checks for suspicious file pairs (e.g., .cmd, .ps1, .bat) that may indicate exploitation of CVE-2023-38831. It does not exploit the vulnerability but detects potential signs of exploitation.
Classification
Scanner 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Access to the system's TEMP directory · WinRAR exploitation artifacts present
nomisec
WORKING POC
1 stars
by ruycr4ft · client-side
https://github.com/ruycr4ft/CVE-2023-38831
This repository contains a functional PoC exploit for CVE-2023-38831, which leverages a vulnerability in WinRAR to achieve arbitrary code execution via a crafted RAR file. The exploit manipulates file names and structures to bypass security checks and execute a malicious script.
Classification
Working Poc 90%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
WinRAR installed on target system · User interaction to open the malicious RAR file
nomisec
WORKING POC
1 stars
by technicalcorp0 · client-side
https://github.com/technicalcorp0/CVE-2023-38831-Exploit
This repository contains a functional Python script that generates a malicious RAR archive exploiting CVE-2023-38831 in WinRAR versions prior to 6.23. The exploit leverages a naming collision between a benign file and a malicious folder to execute arbitrary code when the victim opens the archive.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Python 3.x · WinRAR < 6.23 installed on victim machine · Bait file (e.g., PDF) and payload file (e.g., .bat, .exe, or .pdf)
nomisec
WORKING POC
1 stars
by Ben1B3astt · poc
https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar
This repository contains a functional exploit for CVE-2023-38831, which leverages a vulnerability in WinRAR to generate a malicious RAR archive. The exploit creates a deceptive PDF file that, when opened, executes a reverse shell via a hidden batch script.
Classification
Working Poc 95%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Python environment · WinRAR installed on target system · Network connectivity for reverse shell
nomisec
WORKING POC
1 stars
by s4m98 · client-side
https://github.com/s4m98/winrar-cve-2023-38831-poc-gen
This repository contains a Python script that generates a malicious RAR archive exploiting CVE-2023-38831, a vulnerability in WinRAR's handling of file extensions. The exploit creates a bait file (e.g., PDF) and a hidden batch script that executes arbitrary commands when the user opens the bait file.
Classification
Working Poc 95%
Target:
WinRAR versions before 6.23
No auth needed
Prerequisites:
Python installed · WinRAR version < 6.23
nomisec
WORKING POC
1 stars
by SpamixOfficial · client-side
https://github.com/SpamixOfficial/CVE-2023-38831
This repository contains a functional exploit for CVE-2023-38831, which leverages a directory traversal vulnerability in WinRAR to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The exploit creates a malicious ZIP archive with a benign file and a folder of the same name, embedding executable content within the folder.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 6.23
No auth needed
Prerequisites:
Victim must open the malicious ZIP archive in WinRAR · Victim must attempt to view the benign file within the archive
nomisec
SCANNER
1 stars
by yezzfusl · poc
https://github.com/yezzfusl/cve_2023_38831_scanner
This repository contains a comprehensive scanner for detecting CVE-2023-38831 in WinRAR installations. It employs multiple detection methods including file integrity checks, memory scanning, network analysis, and sandbox execution, but does not include exploit code.
Classification
Scanner 95%
Target:
WinRAR
No auth needed
Prerequisites:
Access to the target system · WinRAR installation
nomisec
WORKING POC
by VictoriousKnight · client-side
https://github.com/VictoriousKnight/CVE-2023-38831_Exploit
This repository contains a functional Python-based exploit for CVE-2023-38831, which leverages a vulnerability in WinRAR's file-processing mechanisms to execute a reverse shell payload via a crafted RAR file. The exploit automates the creation of a malicious RAR archive with embedded VBScript and Python payloads.
Classification
Working Poc 95%
Target:
WinRAR 6.2 and below
No auth needed
Prerequisites:
Python 3.6+ · WinRAR 6.2 or below · Bait file (e.g., PDF or image) · Malicious Python script (e.g., reverse shell)
nomisec
WORKING POC
by ngothienan · poc
https://github.com/ngothienan/CVE-2023-38831
This repository contains a functional exploit for CVE-2023-38831, which involves crafting a malicious RAR archive to execute arbitrary commands when extracted. The exploit includes a generator script to create the malicious archive and a keylogger payload.
Classification
Working Poc 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
WinRAR installation vulnerable to CVE-2023-38831 · Victim interaction to extract the malicious archive
nomisec
WORKING POC
by idkwastaken · client-side
https://github.com/idkwastaken/CVE-2023-38831
This repository contains functional exploit code for CVE-2023-38831, a WinRAR vulnerability that allows arbitrary code execution via a crafted ZIP file. The exploit creates a ZIP with a malicious script disguised as a PDF, leveraging the vulnerability in WinRAR versions <= 6.22.
Classification
Working Poc 95%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
Victim must open the crafted ZIP file in a vulnerable version of WinRAR
nomisec
SUSPICIOUS
by Nielk74 · poc
https://github.com/Nielk74/CVE-2023-38831
The repository lacks functional exploit code for CVE-2023-38831 and instead provides a generic Chocolatey installation script with no direct relation to the vulnerability. The README is minimal and does not include technical details or proof-of-concept exploit code.
Classification
Suspicious 90%
Target:
Chocolatey
No auth needed
Prerequisites:
None specified
nomisec
WORKING POC
by kehrijksen · client-side
https://github.com/kehrijksen/CVE-2023-38831
This repository contains a functional exploit PoC for CVE-2023-38831, an RCE vulnerability in WinRAR versions prior to 6.23. The exploit crafts a malicious ZIP archive that leverages directory traversal and file extension manipulation to execute arbitrary commands when the archive is opened.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Vulnerable version of WinRAR installed · Ability to deliver the malicious ZIP archive to the target
nomisec
WORKING POC
by Fa1c0n35 · client-side
https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit
The repository contains a functional exploit generator for CVE-2023-38831, a WinRAR vulnerability. The Python script creates a malicious RAR archive that exploits a path traversal flaw to execute arbitrary scripts when the archive is opened.
Classification
Working Poc 95%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
WinRAR version <= 6.22 · Victim interaction to open the malicious RAR archive
github
SUSPICIOUS
by DanukaNuwan · poc
https://github.com/DanukaNuwan/CVE-Exploits/tree/main/CVE-2023-38831.pdf
The repository contains no actual exploit code or technical details, only links to external resources (tryhackme.com). This is a common social engineering tactic to lure researchers into visiting external sites.
Classification
Suspicious 90%
Target:
unknown
No auth needed
Prerequisites:
none
nomisec
WRITEUP
by h3xecute · poc
https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831
The repository provides a technical description of CVE-2023-38831, a WinRAR RCE vulnerability exploitable via malicious archives containing a benign file and a folder with the same name. It includes a PoC video link but lacks actual exploit code or in-depth technical analysis.
Classification
Writeup 80%
Target:
WinRAR versions prior to 6.23
No auth needed
Prerequisites:
Victim must open a malicious RAR archive with WinRAR < 6.23
nomisec
WORKING POC
by an040702 · client-side
https://github.com/an040702/CVE-2023-38831
This repository contains a functional exploit for CVE-2023-38831, which involves generating a malicious RAR archive that exploits a vulnerability in WinRAR to execute arbitrary code. The exploit includes a keylogger payload and a client-server setup for exfiltrating logs.
Classification
Working Poc 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Victim must open the malicious RAR archive · Python environment to generate the exploit
nomisec
WRITEUP
by ra3edAJ · poc
https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831
This repository provides a detailed analysis and solution for a DFIR (Digital Forensics and Incident Response) lab simulating a CVE-2023-38831 attack. It includes explanations of Windows registry, NTFS files, browser cache, and Windows function sequences, but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Windows (specific version not specified)
No auth needed
Prerequisites:
Access to a disk image for forensic analysis
nomisec
WORKING POC
by khanhtranngoccva · poc
https://github.com/khanhtranngoccva/cve-2023-38831-poc
This PoC generates a malicious ZIP archive exploiting CVE-2023-38831 by embedding a crafted file path to bypass security checks. The exploit leverages a path traversal vulnerability in WinRAR to execute arbitrary commands via a disguised payload.
Classification
Working Poc 90%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
Victim must extract the malicious ZIP file using WinRAR
nomisec
WORKING POC
by ML-K-eng · poc
https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection
The repository contains a functional Python script that exploits CVE-2023-38831 in WinRAR by crafting a malicious ZIP/RAR archive. The exploit leverages file path manipulation to achieve arbitrary code execution when the archive is extracted.
Classification
Working Poc 90%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
Presence of WinRAR vulnerable version · User interaction to extract the malicious archive
nomisec
WRITEUP
by Tolu12wani · poc
https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution
This repository provides a PDF summary and screenshots demonstrating CVE-2023-38831, which involves embedding and executing malicious payloads in compressed files to trigger a reverse shell. It is a documentation-focused writeup without executable code.
Classification
Writeup 90%
Target:
Unknown (not specified in the provided content)
No auth needed
Prerequisites:
Access to a vulnerable system · Ability to deliver a malicious compressed file
nomisec
WORKING POC
by thegr1ffyn · client-side
https://github.com/thegr1ffyn/CVE-2023-38831
This repository contains a functional exploit generator for CVE-2023-38831, which leverages a vulnerability in WinRAR <= 6.22. The exploit creates a maliciously crafted RAR archive that can execute arbitrary code when extracted by a victim.
Classification
Working Poc 90%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
Victim must extract the malicious RAR archive · Presence of a bait file and a script file (e.g., payload.bat)
nomisec
WORKING POC
by sudo-py-dev · poc
https://github.com/sudo-py-dev/CVE-2023-38831
This repository contains a functional exploit for CVE-2023-38831, a vulnerability in WinRAR versions <= 6.22. The exploit manipulates ZIP archive content to trigger arbitrary code execution by crafting malicious file paths and extensions.
Classification
Working Poc 90%
Target:
WinRAR <= 6.22
No auth needed
Prerequisites:
Victim must extract the malicious ZIP archive using WinRAR
nomisec
WORKING POC
by ouoxii · poc
https://github.com/ouoxii/Software-Testing-Final-Project
This repository contains a functional ZIP file fuzzing tool designed to generate malicious ZIP archives with various fuzzing vectors (e.g., path traversal, buffer overflow, format strings) to test for CVE-2023-38831. The tool includes both a generator for creating test cases and a validator for detecting suspicious ZIP file patterns.
Classification
Working Poc 90%
Target:
ZIP file parsers (e.g., WinRAR, other archive utilities)
No auth needed
Prerequisites:
Python 3.6+ · numpy · target system with vulnerable ZIP parser
nomisec
WRITEUP
by mishra0230 · poc
https://github.com/mishra0230/CVE-2023-38831
This repository provides detection logic and technical analysis for CVE-2023-38831, a WinRAR ZIP file spoofing vulnerability. It includes PowerShell and Python scripts for ETW tracing and API monitoring, along with detailed behavioral and attack flow summaries.
Classification
Writeup 90%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
Vulnerable version of WinRAR (< 6.23) · User interaction to open malicious ZIP
nomisec
WORKING POC
by anelya0333 · poc
https://github.com/anelya0333/Exploiting-CVE-2023-38831
This PoC exploits CVE-2023-38831 by crafting a malicious RAR archive that manipulates file extensions to execute arbitrary scripts when opened in WinRAR. The script automates the creation of a deceptive archive structure to trigger the vulnerability.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 6.23
No auth needed
Prerequisites:
A decoy file (e.g., PDF) · A malicious script (e.g., CMD/BAT) · Victim interaction to open the archive in WinRAR
nomisec
WORKING POC
by GOTonyGO · client-side
https://github.com/GOTonyGO/CVE-2023-38831-winrar
This repository contains a functional exploit builder for CVE-2023-38831, which affects WinRAR versions before 6.23. The script automates the creation of a malicious RAR archive that exploits a directory traversal vulnerability to execute arbitrary commands when the archive is opened.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
A target file to disguise the exploit · A script file to execute upon exploitation
nomisec
SUSPICIOUS
by MyStuffYT · client-side
https://github.com/MyStuffYT/CVE-2023-38831-POC
The repository claims to be a PoC for CVE-2023-38831 but only contains a GUI with buttons linking to external sites (CVE details and WinRAR update page). No actual exploit code or technical details are provided.
Classification
Suspicious 90%
Target:
WinRAR (unspecified version)
No auth needed
Prerequisites:
None
nomisec
WORKING POC
by sh770 · poc
https://github.com/sh770/CVE-2023-38831
This repository contains a functional exploit for CVE-2023-38831, a WinRAR vulnerability affecting versions 6.22 and below. The PoC creates a maliciously crafted ZIP archive that exploits a path traversal issue to execute arbitrary commands when the archive is extracted.
Classification
Working Poc 90%
Target:
WinRAR 6.22 and below
No auth needed
Prerequisites:
Python environment · WinRAR 6.22 or below installed on target system
nomisec
WORKING POC
by RomainBayle08 · client-side
https://github.com/RomainBayle08/CVE-2023-38831
This script generates a malicious RAR archive exploiting CVE-2023-38831 by manipulating file extensions to bypass security checks. It creates a deceptive archive structure that can execute arbitrary commands when extracted.
Classification
Working Poc 90%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
WinRAR installed on target system · User interaction to extract the archive
nomisec
WORKING POC
by imbyter · client-side
https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831
The repository contains a functional Python script (`make-poc.py`) that generates a malicious RAR archive exploiting CVE-2023-38831, a file extension spoofing vulnerability in WinRAR versions prior to 6.23. The exploit creates a deceptive archive where a seemingly harmless file (e.g., JPG, PDF) executes a hidden batch script when opened.
Classification
Working Poc 95%
Target:
WinRAR < 6.23
No auth needed
Prerequisites:
WinRAR version < 6.23 · User interaction to open the malicious archive
nomisec
WORKING POC
by solomon12354 · poc
https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC
This repository contains a functional exploit for CVE-2023-38831, which leverages a WinRAR vulnerability to execute arbitrary commands via a crafted archive. It also includes a UAC bypass technique to escalate privileges.
Classification
Working Poc 90%
Target:
WinRAR (versions affected by CVE-2023-38831)
No auth needed
Prerequisites:
Victim interaction to open the crafted RAR file · Windows environment
nomisec
WRITEUP
by FirFirdaus · client-side
https://github.com/FirFirdaus/CVE-2023-38831
This repository provides a detailed technical walkthrough of CVE-2023-38831, a WinRAR vulnerability that allows malicious files to bypass extraction checks. It includes step-by-step exploitation details, code explanations, and demonstration screenshots.
Classification
Writeup 90%
Target:
WinRAR version 6.22 and below
No auth needed
Prerequisites:
Victim interaction to download and extract the malicious RAR file · Network connectivity for reverse shell
nomisec
WORKING POC
by asepsaepdin · client-side
https://github.com/asepsaepdin/CVE-2023-38831
This repository contains a functional Python script that generates a malicious RAR archive exploiting CVE-2023-38831 in WinRAR versions before 6.23. The exploit leverages a directory traversal-like behavior where a ZIP archive contains a benign file and a folder with the same name, allowing arbitrary code execution when the user attempts to view the benign file.
Classification
Working Poc 95%
Target:
WinRAR before 6.23
No auth needed
Prerequisites:
WinRAR version < 6.23 · User interaction to open the malicious archive
metasploit
WORKING POC
EXCELLENT
by Alexander, Hagenah · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
This Metasploit module exploits CVE-2023-38831 in WinRAR by crafting a malicious RAR archive that executes a payload when the decoy file is opened. It leverages a directory traversal vulnerability to achieve remote code execution.
Classification
Working Poc 100%
Target:
WinRAR (versions prior to 6.23)
No auth needed
Prerequisites:
A decoy file (PDF, JPG, PNG, etc.) · User interaction to open the crafted RAR file