⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-08-15.
CVE-2018-20250 — Absolute Path Traversal in Winrar
Severity
7.8HIGHNVD
EPSS
93.5%
top 0.18%
CISA KEV
KEVRansomware
Added 2022-02-15
Due 2022-08-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 5
KEV addedFeb 15
Latest updateMay 13
KEV dueAug 15
CISA Required Action: Apply updates per vendor instructions.
Description
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9