Bug 2443166 (CVE-2026-28208) - CVE-2026-28208 com.github.junrar/junrar: Junrar: Remote code execution via path traversal when extracting crafted RAR archives
Summary: CVE-2026-28208 com.github.junrar/junrar: Junrar: Remote code execution via pa...
Keywords:
Status: NEW
Alias: CVE-2026-28208
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-26 23:01 UTC by OSIDB Bzimport
Modified: 2026-02-27 00:08 UTC (History)
24 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-26 23:01:57 UTC
Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix. This can often lead to remote code execution (e.g., overwriting shell profiles, source code, cron jobs, etc). Version 7.5.8 has a fix for the issue.


Note You need to log in before you can comment on or make changes to this bug.