Rapid7 Vulnerability & Exploit Database

Rarlab WinRAR: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2018-20251)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Rarlab WinRAR: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2018-20251)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
02/05/2019
Created
04/22/2019
Added
04/08/2019
Modified
04/22/2019

Description

In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.

Solution(s)

  • rarlab-winrar-upgrade-5_70

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;