HTTP: RARLAB WinRAR ACE Directory Traversal

This signature detects attempts to exploit a known vulnerability against RARLAB WinRAR. A successful attack can lead to arbitrary file creation.

Extended Description

In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.

Affected Products

Rarlab winrar

Short Name
HTTP:DIR:WINRAR-ACE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
ACE CVE-2018-20251 Directory RARLAB Traversal WinRAR bid:106948
Release Date
03/13/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Rarlab

CVSS Score

4.3

Found a potential security threat?