Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.win-rar.com/whatsnew.html", "name": "https://www.win-rar.com/whatsnew.html", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/106948", "name": "106948", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "name": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE", "name": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.exploit-db.com/exploits/46552/", "name": "46552", "tags": ["Exploit", "VDB Entry", "Third Party Advisory"], "refsource": "EXPLOIT-DB"}, {"url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html", "name": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace", "name": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.exploit-db.com/exploits/46756/", "name": "46756", "tags": ["Exploit", "VDB Entry", "Third Party Advisory"], "refsource": "EXPLOIT-DB"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-22"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2018-20250", "ASSIGNER": "cve@checkpoint.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}}, "publishedDate": "2019-02-05T20:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "5.61"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-10-09T23:39Z"}