WinRAR Flaw: How It Was Exploited to Spread Malware.
WinRAR被发现存在零日漏洞(CVE-2025-8088),攻击者可利用该漏洞通过恶意RAR文件将数据写入系统关键目录(如启动文件夹或%TEMP%),导致恶意软件静默安装。此漏洞已被俄罗斯威胁组织RomCom APT用于部署多种恶意软件。建议用户更新至7.13或更高版本以修复问题。 2025-9-8 10:50:36 Author: infosecwriteups.com(查看原文) 阅读量:23 收藏

S.Ali

Heads Up: If you use WinRAR, update it now to version 7.13 or newer.

WinRAR, the free file archiver used by millions worldwide, was found at the center of a zero-day vulnerability.

ESET, a security firm, found a flaw in WinRAR (CVE-2025-8088) that enabled attackers to write files outside of the extraction directory using a decade-old feature, Alternate Data Streams(ADS) and path traversal(..\..), of Windows that still present in the NTFS file system.

What happened?

This flaw let attackers make malicious .rar archives containing specially formatted file paths. These archives could then write data outside the folder where the user intended to extract them. By using a combination of path traversal sequences with NTFS Alternate Data Stream (ADS), they bypassed WinRAR’s normal checks which could lead to silent malware drop into Startup folder, %TEMP%, or %LOCALAPPDATA%.

This was not a memory corruption or kernel exploit. This was a classic input sanitization flaw. The attackers simply needed to convince a user to extract a malicious archive.

How It Was Exploited

Researchers tracked the Russian threat group RomCom APT (also known as Tropical Scorpius or Storm-0978) exploiting this bug to deploy several types of malware, including:

  • Mythic Agent: a command and control framework.
  • SnipBot: a modular loader with…

文章来源: https://infosecwriteups.com/winrar-flaw-how-it-was-exploited-to-spread-malware-61088e6e9ef8?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh