Lucene search

K
zdiOrange Tsai(@orange.8361) and NiNi (@terrynini38514) from DEVCORE Research TeamZDI-24-357
HistoryApr 01, 2024 - 12:00 a.m.

RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability

2024-04-0100:00:00
Orange Tsai(@orange.8361) and NiNi (@terrynini38514) from DEVCORE Research Team
www.zerodayinitiative.com
8
rarlab winrar
vulnerability
bypass
remote attackers
mark-of-the-web
user interaction
exploit
archive extraction
arbitrary file
code execution

7.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page. The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user.

7.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%