RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899.
References
Link | Resource |
---|---|
https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit Third Party Advisory |
https://www.rarlab.com/rarnew.htm | Release Notes |
https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit Third Party Advisory |
https://www.rarlab.com/rarnew.htm | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
20 Jun 2025, 17:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft
Microsoft windows Rarlab winrar Rarlab |
|
CPE | cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
References | () https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 - Exploit, Third Party Advisory | |
References | () https://www.rarlab.com/rarnew.htm - Release Notes |
Information
Published : 2024-05-21 17:15
Updated : 2025-06-20 17:38
NVD link : CVE-2024-36052
Mitre link : CVE-2024-36052
CVE.ORG link : CVE-2024-36052
JSON object : View
Products Affected
rarlab
- winrar
microsoft
- windows
CWE
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences