4.3
CVSSv2

CVE-2018-20251

Published: 05/02/2019 Updated: 09/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the malicious user to create empty files and folders everywhere in the file system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rarlab winrar

Github Repositories

Script in PowerShell to detect vulnerable versions of WinRAR (related to ACE files) in a Windows domain.

WinRAR ACE vulnerability scanner for Domain Description: Script in PowerShell to detect vulnerable versions of WinRAR (related to ACE files) in a Windows domain CVEs: (CVE-2018-20250) (CVE-2018-20251) (CVE-2018-20252) (CVE-2018-20253) Considerations: Well configured WinRM on remote machines Well configured firewall rules Allow ping to remote machines from the Domain Control