This repository contains a Python script that demonstrates a proof-of-concept (PoC) exploit for CVE-2023-38831. This exploit leverages a vulnerability in specific file-processing mechanisms to execute a reverse shell payload through a malicious RAR file.
Disclaimer:
This project is intended for educational purposes and ethical security research only. Unauthorized use of this code to compromise systems or networks without prior consent is illegal and unethical. The author disclaims all responsibility for misuse.
The script automates the creation of a malicious RAR file that exploits the CVE-2023-38831 vulnerability. It embeds a Python reverse shell script into a crafted file structure that executes stealthily.
- Takes a bait file (non-suspicious file) and a script file (malicious payload) as input.
- Creates a structured directory to hide the malicious payload.
- Embeds a
VBScript
to execute the payload silently. - Crafts a RAR archive with manipulated file headers to bypass detection mechanisms.
- Outputs the final exploit file.
- Python 3.6+
- WinRAR 6.2 or below.
- Ensure
shutil
andos
modules are available (these are standard with Python).
-
Clone this repository:
git clone https://github.com/VictoriousKnight/CVE-2023-38831-POC.git cd CVE-2023-38831-POC
-
Prepare the following files:
- Bait file: Any legitimate empty file (e.g., a harmless PDF or image).
- Script file: A Python reverse shell or similar payload.
-
Run the script:
python exploit.py
-
Provide the required inputs:
- Name of the bait file.
- Name of the malicious script.
- Desired name for the output RAR file.
-
The exploit file will be generated in the current working directory.
$ python exploit.py
CVE-2023-38831 POC
-------------------------------
Enter the bait file name: scholarship.pdf
Enter the script file name: shell.py
Enter the output RAR file name: scholarship_approved.rar
Exploit generated successfully as 'scholarship_approved.rar'.
- This script is a proof of concept and should be used only in controlled environments with explicit permission from the system owner.
- Avoid distributing or using the generated files outside ethical or educational contexts.
- The exploit relies on known behaviors of RAR processing utilities and may not work in all configurations.
- Kunal Rajour
- GitHub: VictotiousKnight
Reminder: Misuse of this script can lead to severe legal consequences. Always follow ethical guidelines and obtain proper authorization.