HTTP: RARLAB WinRAR File Extension Spoofing

This signature detects attempts to exploit a known vulnerability against RARLAB WinRAR. A successful attack can lead to arbitrary code execution.

Extended Description

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

Affected Products

Rarlab winrar

References

CVE: CVE-2023-38831

Short Name
HTTP:STC:DL:RAR-FILE-SPOOFING
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-38831 Extension File RARLAB Spoofing WinRAR
Release Date
09/14/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3645
False Positive
Unknown
Vendors

Rarlab

Found a potential security threat?