vendor:
WinRar
by:
R-73eN
8,8
CVSS
HIGH
Command Execution
78
CWE
Product Name: WinRar
Affected Version From: Winrar < 5.30 beta 4
Affected Version To: Winrar < 5.30 beta 4
Patch Exists: YES
Related CWE: N/A
CPE: a:winrar:winrar
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 Ultimate
2015
WinRar Settings Import Command Execution
The vulnerability exists in the 'Import Settings From File' function of WinRar. Since Settings file of Winrar are saved as a registry file and WinRar executes it in an automatic way without checking if it is writing to the Registry keys used by winrar, we can create a specially crafted settings file and we can overwrite registry keys. We can specify a meterpreter DLL payload using a UNC path on an SMB server we control and then next time a new process starts we will get a shell.
Mitigation:
Upgrade to WinRAR 5.30 beta 4 or later.