RarLab WinRAR < v6.23 - Arbitrary Code Execution (RCE) via Exploit of Incorrectly-Resolved Name or Reference (CVE-2023-38831)
Description
Background & Context
WinRAR is a trialware file archiver utility for Windows, developed by win.rar GmbH. It can create and view archives in RAR or ZIP file formats, and unpack numerous archive file formats. To enable the user to test the integrity of archives, WinRAR embeds CRC32 or BLAKE2 checksums for each file in each archive. WinRAR supports creating encrypted, multi-part and self-extracting archives. WinRAR is a Windows-only program.
ZIP is an archive file format that supports lossless data compression. A ZIP file may contain one or more files or directories that may have been compressed. The ZIP file format permits a number of compression algorithms, though DEFLATE
is the most common. ZIP files generally use the file extensions .zip
or .ZIP
and the MIME media type application/zip
.
Vulnerability Summary
RARLabs WinRAR before 6.23 contains a critical security vulnerability. A ZIP archive may include a benign file (such as an ordinary .JPG
file) and also a folder that has the same name as the benign file. In vulnerable versions of WinRAR, the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This allows threat actors to spoof file extensions, thereby making it possible to launch malicious scripts contained within an archive that masquerades as seemingly innocuous image or text files.
Impact If Exploited
Successful exploit allows attackers to execute arbitrary code when a user attempts to view a file within a ZIP archive.
Threat Landscape & Known Exploitation
Exploit code is available to threat actors 'in the wild' via sites including GitHub. This vulnerability has previously been reported by the CISA (America's Cyber Defense Agency) to be known to be currently actively exploited in the wild as of August 2023 and security researchers indicate that this vulnerability has been exploited as a zero-day since as early as April 2023. However, despite the availability of a patch and widespread warning of the risk of exploit, as of September 2024 sufficient installations remain unpatched that a second wave of exploitation has been reported by Kaspersky security, who report that that 'Head Mare' hacktivist group is actively targeting organisations for exploitation using this vulnerability.
Affected Product Versions
RARLabs WinRAR before version 6.23
Indicators of Compromise (IoC)
The vendor has not published a list of indicators of compromise (IoC) at the time of writing however third parties report the involvement of the following IoCs, including IPs used for C&C (command and control) functions:
Hashes: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 addresses:
188.127.237[.]46
45.87.246[.]169
45.87.245[.]30
185.80.91[.]107
188.127.227[.]201
5.252.176[.]47
45.11.27[.]232
URLs:
188.127.237[.]46/winlog.exe
188.127.237[.]46/servicedll.exe
194.87.210[.]134/gringo/splhost.exe
194.87.210[.]134/gringo/srvhost.exe
94.131.113[.]79/splhost.exe
94.131.113[.]79/resolver.exe
45.156.21[.]178/dlldriver.exe
5.252.176[.]77/ngrok.exe
5.252.176[.]77/sherlock.ps1
5.252.176[.]77/sysm.elf
5.252.176[.]77/servicedll.rar
5.252.176[.]77/reverse.exe
5.252.176[.]77/soft_knitting.exe
5.252.176[.]77/legislative_cousin.exe
5.252.176[.]77/2000×2000.php
Remediation
Official Fix & Remediation Guidance
RARLabs have released a critical security update in version 6.23, which may be downloaded from the RARLab website at https://www.rarlab.com/download.htm. Customers are advised to upgrade to the latest version of WinRAR.
NOTE: Remediation of this vulnerability by patching to a specific version indicated may not be sufficient to secure the product against further vulnerabilities discovered in later versions, subsequent to the publication of this guidance. Unless contra-indicated, customers are therefore advised to always upgrade to the latest version of the product available.
Temporary Mitigation & Workarounds
(The vendor has not advised of any alternative temporary mitigation or workarounds)
NOTE: Caution should always be taken in applying any temporary mitigations listed. Mitigations are only recommended in cases where patches to remediate the vulnerability are not available, or cannot safely be applied to a given environment immediately. A given mitigation may not in all cases be recommended officially by the application vendor. The viability of any given temporary mitigation measure may vary, depending on server platform and existing configuration. Mitigations listed may incompletely remediate any given vulnerability. Configuration changes to implement listed mitigations may impact/disrupt required functionality within a given customer application. Care should therefore be taken to carefully analyse any listed mitigations for appropriateness to a given environment. Customers are advised to test any configuration changes prior to their being introduced into a production environment.
References
Vendor Advisories
TBC
Third-Party Analysis & Threat Intelligence
https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
https://cybersecuritynews.com/hacktivist-group-exploit-winrar-vulnerability/
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-38831.html
https://thehackernews.com/2024/09/cloudflare-warns-of-india-linked.html
PoC and Exploit Code
Risk
Versions
Information
- Category
- Arbitrary Code Execution
- CWE
- CWE-1287
- CWE-706
- CVE
- Known Exploitation Activity
OWASP
- OWASP 2013
- Unknown
- OWASP 2017
- Unknown
- OWASP 2021
- Unknown