Skip to content

Commit fbcfd42

Browse files
committedAug 27, 2023
fit typo & update readme
1 parent 1c84122 commit fbcfd42

File tree

3 files changed

+16
-4
lines changed

3 files changed

+16
-4
lines changed
 
File renamed without changes.

‎README.md

+15-3
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,30 @@
11

22
# CVE-2023-38831 winrar exploit generator
33

4+
## Quick poc test
5+
6+
Generate the default poc for test
7+
8+
```
9+
python cve-2023-38831-exp-gen.py poc
10+
or
11+
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat poc.rar
12+
```
13+
14+
## Custom
15+
416
1. Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (.png, jpg) or a document (.pdf)
5-
2. Run `python . \cve-2023-38831-exp-gen.py poc` to generate the default poc for test
6-
3. Run `python . \cve-2023-38831-exp-gen.py <bait name> <script name> <output name>` to generate your exploit
17+
2. Run `python cve-2023-38831-exp-gen.py <bait name> <script name> <output name>` to generate your exploit
718

819

20+
## Screenshots
921

1022
Infected version: winrar <= 6.22
1123

1224
![demo](./demo.png)
1325

1426

1527

16-
reference:
28+
## Reference
1729

1830
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/

‎cve-2023-38831-exp-gen.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
import os, sys
33
from os.path import join
44
TEMPLATE_NAME = "TEMPLATE"
5-
OUTPUT_NAME = "CVE-2023-38831-poc.tar"
5+
OUTPUT_NAME = "CVE-2023-38831-poc.rar"
66

77
BAIT_NAME = "CLASSIFIED_DOCUMENTS.pdf"
88
SCRIPT_NAME = "script.bat"

0 commit comments

Comments
 (0)
Please sign in to comment.