DescriptionDirectory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs774172

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rar (PTS)buster/non-free, bullseye/non-free2:5.5.0-1fixed
bookworm/non-free, sid/non-free2:6.20~b1-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[jessie] - rar <no-dsa> (Non-free not supported)
[wheezy] - rar <no-dsa> (Non-free not supported)
[squeeze] - rar <no-dsa> (Not fixed upstream and license does not allow modification)
Version 5.21 upstream changes behaviour: by default rar skips symbolic links
symbolic links with absolute paths in link target when extracting.

Search for package or bug name: Reporting problems