Vulnerability Description
In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rarlab | Winrar | <= 5.61 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106948Third Party AdvisoryVDB Entry
- https://research.checkpoint.com/extracting-code-execution-from-winrar/ExploitThird Party Advisory
- https://www.win-rar.com/whatsnew.htmlRelease NotesVendor Advisory
- http://www.securityfocus.com/bid/106948Third Party AdvisoryVDB Entry
- https://research.checkpoint.com/extracting-code-execution-from-winrar/ExploitThird Party Advisory
- https://www.win-rar.com/whatsnew.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2018-20251?
CVE-2018-20251 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as wr...
How severe is CVE-2018-20251?
CVE-2018-20251 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20251?
Check the references section above for vendor advisories and patch information. Affected products include: Rarlab Winrar.