CVE 2023 38831 Winrar Exploit Save Abandoned

CVE-2023-38831 winrar exploit generator

Project README

CVE-2023-38831 winrar exploit generator

Quick poc test

Generate the default poc for test

python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat  poc.rar

Custom

  1. Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (.png, jpg) or a document (.pdf)
  2. Run python cve-2023-38831-exp-gen.py <bait name> <script name> <output name> to generate your exploit

Screenshots

Infected version: winrar <= 6.22

demo

Analysis Blog

https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/

Reference

https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/

Open Source Agenda is not affiliated with "CVE 2023 38831 Winrar Exploit" Project. README Source: b1tg/CVE-2023-38831-winrar-exploit
Stars
499
Open Issues
1
Last Commit
8 months ago

Open Source Agenda Badge

Open Source Agenda Rating