RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202309-04 | Third Party Advisory |
https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz | Patch |
https://www.rarlab.com/rar_add.htm | Product |
http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202309-04 | Third Party Advisory |
https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz | Patch |
https://www.rarlab.com/rar_add.htm | Product |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202309-04 - Third Party Advisory | |
References | () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch | |
References | () https://www.rarlab.com/rar_add.htm - Product |
28 Jun 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Debian |
|
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202309-04 - Third Party Advisory | |
References | () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
17 Sep 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-05-09 08:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30333
Mitre link : CVE-2022-30333
CVE.ORG link : CVE-2022-30333
JSON object : View
Products Affected
rarlab
- unrar
debian
- debian_linux
linux
- linux_kernel
opengroup
- unix
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')