Lucene search

K
vulnrichmentZdiVULNRICHMENT:CVE-2024-30370
HistoryApr 02, 2024 - 8:28 p.m.

CVE-2024-30370 RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability

2024-04-0220:28:47
CWE-693
zdi
github.com
1
rarlab winrar
mark-of-the-web
bypass vulnerability
remote attackers
arbitrary files
execute arbitrary code

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.

The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.

CNA Affected

[
  {
    "vendor": "RARLAB",
    "product": "WinRAR",
    "versions": [
      {
        "version": "7.00 beta 4 (64-bit)",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Related for VULNRICHMENT:CVE-2024-30370