Vulnerability Details CVE-2018-20250
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.932
EPSS Ranking 99.8%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 6.8
Proposed Action
WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution
Ransomware Campaign
Known
Products affected by CVE-2018-20250
-
cpe:2.3:a:rarlab:winrar:-
-
cpe:2.3:a:rarlab:winrar:4.00
-
cpe:2.3:a:rarlab:winrar:4.01
-
cpe:2.3:a:rarlab:winrar:4.1.0
-
cpe:2.3:a:rarlab:winrar:4.10
-
cpe:2.3:a:rarlab:winrar:4.10.2
-
cpe:2.3:a:rarlab:winrar:4.11
-
cpe:2.3:a:rarlab:winrar:4.20
-
cpe:2.3:a:rarlab:winrar:5.00
-
cpe:2.3:a:rarlab:winrar:5.01
-
cpe:2.3:a:rarlab:winrar:5.10
-
cpe:2.3:a:rarlab:winrar:5.11
-
cpe:2.3:a:rarlab:winrar:5.20
-
cpe:2.3:a:rarlab:winrar:5.21
-
cpe:2.3:a:rarlab:winrar:5.30
-
cpe:2.3:a:rarlab:winrar:5.31
-
cpe:2.3:a:rarlab:winrar:5.40
-
cpe:2.3:a:rarlab:winrar:5.50