CISA KEV 정보
| 취약점명 | RARLAB UnRAR Directory Traversal Vulnerability |
|---|---|
| 설명 | RARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-22 | CWE-59 |
| 등록일 (KEV) | 2022-08-09 |
| 조치 기한 | 2022-08-30 |
| 추가 참고 | Vulnerability updated with version 6.12. Accessing link will download update information: https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz; https://nvd.nist.gov/vuln/detail/CVE-2022-30333 |
NVD 상세 정보
CVSS v3.1: 7.5 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NCVSS v2.0: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N설명: RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CWE: CWE-22 | CWE-22 | CWE-59
참조
- http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html [Exploit, Third Party Advisory, VDB Entry]
- https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ [Exploit, Third Party Advisory]
- https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html [Mailing List, Third Party Advisory]
- https://security.gentoo.org/glsa/202309-04 [Third Party Advisory]
- https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz [Patch]
- https://www.rarlab.com/rar_add.htm [Product]
- http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html [Exploit, Third Party Advisory, VDB Entry]
- https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ [Exploit, Third Party Advisory]
- https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html [Mailing List, Third Party Advisory]
- https://security.gentoo.org/glsa/202309-04 [Third Party Advisory]
- https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz [Patch]
- https://www.rarlab.com/rar_add.htm [Product]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-30333 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.