CVE-2018-20250

Scores

EPSS

0.935high93.5%
0%20%40%60%80%100%

Percentile: 93.5%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-36

Related Vulnerabilities

Exploits

Exploit ID: 46552

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46552

Exploit ID: 46756

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46756

Exploit ID: CVE-2018-20250

Source: github-poc

URL: https://github.com/eastmountyxz/CVE-2018-20250-WinRAR

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: winrar

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*",      "versionEndIncluding": "5.61",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list