Lucene search

K
cve[email protected]CVE-2024-30370
HistoryApr 02, 2024 - 9:15 p.m.

CVE-2024-30370

2024-04-0221:15:50
CWE-693
web.nvd.nist.gov
36
rarlab
winrar
mark-of-the-web
bypass
vulnerability
remote attackers
user interaction
crafted archive
arbitrary file
arbitrary code
zdi-can-23156
nvd

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

4.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.

The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.

Affected configurations

Vulners
Node
rarlabwinrarRange7.00

CNA Affected

[
  {
    "vendor": "RARLAB",
    "product": "WinRAR",
    "versions": [
      {
        "version": "7.00 beta 4 (64-bit)",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

4.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Related for CVE-2024-30370