CVE-2023-38831
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- July 25, 2023
- Published Date
- August 23, 2023
- Last Updated
- December 18, 2024
- Vendor
- n/a
- Product
- n/a
- Description
- RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-08-24 00:00:00 UTC |
Recent Mentions
Russian GRU Targeting Western Logistics Entities and Technology Companies
Source: All CISA Advisories • Published: 2025-05-21 12:00:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb | 2025-04-29 11:01:36 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
winrar_cve_2023_38831
Type: metasploit • Created: Unknown
Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784
Type: github • Created: 2024-06-25 02:30:31 UTC • Stars: 0
SpamixOfficial/CVE-2023-38831
Type: github • Created: 2023-12-12 14:54:30 UTC • Stars: 1
malvika-thakur/CVE-2023-38831
Type: github • Created: 2023-09-21 06:08:30 UTC • Stars: 3
ameerpornillos/CVE-2023-38831-WinRAR-Exploit
Type: github • Created: 2023-09-12 16:01:17 UTC • Stars: 3
Malwareman007/CVE-2023-38831
Type: github • Created: 2023-09-12 14:07:00 UTC • Stars: 9
xaitax/WinRAR-CVE-2023-38831
Type: github • Created: 2023-09-03 21:14:05 UTC • Stars: 12
Mich-ele/CVE-2023-38831-winrar
Type: github • Created: 2023-09-01 16:45:42 UTC • Stars: 3
MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC
Type: github • Created: 2023-08-30 19:55:11 UTC • Stars: 8
z3r0sw0rd/CVE-2023-38831-PoC
Type: github • Created: 2023-08-30 11:52:23 UTC • Stars: 5
ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc
Type: github • Created: 2023-08-28 22:08:31 UTC • Stars: 11
PascalAsch/CVE-2023-38831-KQL
Type: github • Created: 2023-08-28 15:26:14 UTC • Stars: 4
knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
Type: github • Created: 2023-08-28 14:48:22 UTC • Stars: 41
Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE
Type: github • Created: 2023-08-28 08:56:16 UTC • Stars: 22
HDCE-inc/CVE-2023-38831
Type: github • Created: 2023-08-28 04:56:10 UTC • Stars: 71
ignis-sec/CVE-2023-38831-RaRCE
Type: github • Created: 2023-08-27 21:49:37 UTC • Stars: 115
IR-HuntGuardians/CVE-2023-38831-HUNT
Type: github • Created: 2023-08-27 08:42:24 UTC • Stars: 2
b1tg/CVE-2023-38831-winrar-exploit
Type: github • Created: 2023-08-25 09:44:08 UTC • Stars: 788
BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc
Type: github • Created: 2023-08-24 16:03:07 UTC • Stars: 91
Timeline
-
Used in Fancy Bear APT Campaign
-
CVE ID Reserved
-
CVE Published to Public
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
Detected by Metasploit