CVE-2024-30370
CVSS V2 None
CVSS V3 None
Description
RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.
The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
Overview
- CVE ID
- CVE-2024-30370
- Assigner
- zdi
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-02T20:28:47.578Z
- Last Modified Date
- 2024-06-06T19:17:39.956Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-357/ | x_research-advisory |
https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed | vendor-advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-30370 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30370 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 11:34:28 | Added to TrackCVE |