CVE-2022-30333

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry
References () https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ - Exploit, Third Party Advisory () https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202309-04 - Third Party Advisory () https://security.gentoo.org/glsa/202309-04 - Third Party Advisory
References () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch
References () https://www.rarlab.com/rar_add.htm - Product () https://www.rarlab.com/rar_add.htm - Product

28 Jun 2024, 14:12

Type Values Removed Values Added
First Time Debian debian Linux
Debian
References () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - () https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202309-04 - () https://security.gentoo.org/glsa/202309-04 - Third Party Advisory
References () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch, Vendor Advisory () https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz - Patch
CPE cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

17 Sep 2023, 07:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202309-04 -

17 Aug 2023, 19:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html -

Information

Published : 2022-05-09 08:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30333

Mitre link : CVE-2022-30333

CVE.ORG link : CVE-2022-30333


JSON object : View

Products Affected

rarlab

  • unrar

debian

  • debian_linux

linux

  • linux_kernel

opengroup

  • unix
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')