CVE-2023-38831
RARLAB WinRAR Code Execution Vulnerability - [Actively Exploited]
Description
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
INFO
Published Date :
Aug. 23, 2023, 5:15 p.m.
Last Modified :
Nov. 21, 2024, 8:14 a.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
5.9
Exploitability Score :
1.8
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
RARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa; https://nvd.nist.gov/vuln/detail/CVE-2023-38831
Public PoC/Exploit Available at Github
CVE-2023-38831 has a 102 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-38831
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Python
Cybersecurity MSc final project study
cpp python ransomware rust
C++ Makefile Python Rust Batchfile
CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content.
Batchfile Python
None
Python Batchfile
None
Python Batchfile
None
C Batchfile PowerShell
None
Python Batchfile
This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF).
Python Batchfile
d
None
None
HTML
A POC demo on CVE-2023-38831
This Python application scans for the CVE-2023-38831 vulnerability in WinRAR.
cve-2023-38831 cybersecurity memory-scanning network-analysis security-scanner vulnerability-detection sandbox-security winrar-vulnerability
Python HTML
None
HTML
Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique.
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-38831
vulnerability anywhere in the article.
- Kaspersky
IT threat evolution Q3 2024
IT threat evolution in Q3 2024 IT threat evolution in Q3 2024. Non-mobile statistics IT threat evolution in Q3 2024. Mobile statistics Targeted attacks New APT threat actor targets Russian government ... Read more
- Cybersecurity News
Asyncshell: The Evolution of APT-K-47’s Cyber Arsenal
Attack Chain | Image: Knownsec 404 Advanced Threat Intelligence teamThe Knownsec 404 Advanced Threat Intelligence team has uncovered a sophisticated and evolving threat from the APT-K-47 group, also k ... Read more
- The Hacker News
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asynshell. The attack campaign is said to have used Hajj-themed lures to trick victims into ... Read more
- security.nl
VS publiceert overzicht van meest misbruikte kwetsbaarheden in 2023
De Amerikaanse autoriteiten hebben samen met cyberagentschappen uit Australië, Canada, Nieuw-Zeeland en het Verenigd Koninkrijk een overzicht van de meest misbruikte kwetsbaarheden in 2023 opgesteld. ... Read more
- Cybersecurity News
SloppyLemming’s Espionage Campaign Targets South Asia
A recent report from Cloudforce One has detailed a cyber espionage campaign orchestrated by a threat actor dubbed SloppyLemming, targeting government, defense, telecommunications, and energy sectors a ... Read more
- The Hacker News
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities
Cloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and comman ... Read more
- Dark Reading
'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks
Source: National Picture Library via Alamy Stock PhotoA threat actor is leveraging Cloudflare Worker cloud services and other tools to perform espionage against government and law enforcement targets ... Read more
- Cybersecurity News
Ajina.Banker: Unmasking the Android Malware Targeting Central Asian Banks
Screenshot of the sample found on the VirusTotal platformCybersecurity analysts at Group-IB have uncovered a sophisticated malware campaign targeting bank customers in Central Asia. Dubbed “Ajina.Bank ... Read more
- The Hacker News
Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus
A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. "Head Mare uses more up-to-date methods for obtaining initia ... Read more
- Kaspersky
Head Mare: adventures of a unicorn in Russia and Belarus
Head Mare is a hacktivist group that first made itself known in 2023 on the social network X (formerly Twitter)[1]. In their public posts, the attackers reveal information about some of their victims, ... Read more
- Cybersecurity News
Warning: Fake WinRar Websites Distributing Malware
SonicWall has recently issued a cybersecurity alert about a deceptive website that mimics the official WinRar site. This fake site, win-rar.co, not only closely resembles the legitimate WinRar site bu ... Read more
- The Cloudflare Blog
RADIUS/UDP vulnerable to improved MD5 collision attack
2024-07-0917 min readThe MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely two different messages X1 and X2 where MD5(X1) = MD5 (X ... Read more
Government-backed actors exploiting WinRAR vulnerability
K Kate Morgan Threat Analysis Group In recent weeks, Google’s Threat Analysis Group’s (TAG) has observed multiple government-backed hacking groups exploiting the known vulnerability, CVE-2023-38831, i ... Read more
The following table lists the changes that have been made to the
CVE-2023-38831
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html Added Reference https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ Added Reference https://news.ycombinator.com/item?id=37236100 Added Reference https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Added Reference https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ -
Modified Analysis by [email protected]
Aug. 14, 2024
Action Type Old Value New Value Removed CWE NIST NVD-CWE-noinfo Added CWE NIST CWE-345 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jul. 03, 2024
Action Type Old Value New Value Added CWE CISA-ADP CWE-351 Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H -
Modified Analysis by [email protected]
Jun. 27, 2024
Action Type Old Value New Value Changed Reference Type http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry Changed Reference Type https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ No Types Assigned https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ Exploit, Third Party Advisory -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Oct. 23, 2023
Action Type Old Value New Value Changed Description RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. -
CVE Modified by [email protected]
Oct. 19, 2023
Action Type Old Value New Value Changed Description RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through August 2023. RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. Added Reference https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ [No Types Assigned] -
CVE Modified by [email protected]
Sep. 08, 2023
Action Type Old Value New Value Added Reference http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html [No Types Assigned] -
Initial Analysis by [email protected]
Aug. 29, 2023
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Changed Reference Type https://news.ycombinator.com/item?id=37236100 No Types Assigned https://news.ycombinator.com/item?id=37236100 Issue Tracking, Third Party Advisory Changed Reference Type https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ No Types Assigned https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Third Party Advisory Changed Reference Type https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ No Types Assigned https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Third Party Advisory Added CWE NIST NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* versions up to (excluding) 6.23 -
CVE Modified by [email protected]
Aug. 23, 2023
Action Type Old Value New Value Added Reference https://news.ycombinator.com/item?id=37236100 [No Types Assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-38831
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-38831
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
48.60 }} 4.72%
score
0.97608
percentile