CVE-2024-8811
CVSS V2 None
CVSS V3 None
Description
WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.
Overview
- CVE ID
- CVE-2024-8811
- Assigner
- zdi
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-22T21:03:11.483Z
- Last Modified Date
- 2024-11-22T21:03:11.483Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1234/ | x_research-advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-8811 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8811 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-23 13:15:59 | Added to TrackCVE |