CVE-2024-30370

RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page. The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rarlab:winrar:7.00:beta4:*:*:*:*:*:*

History

20 Jun 2025, 18:15

Type Values Removed Values Added
References () https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed - () https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed - Release Notes
References () https://www.zerodayinitiative.com/advisories/ZDI-24-357/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-357/ - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:rarlab:winrar:7.00:beta4:*:*:*:*:*:*
First Time Rarlab
Rarlab winrar

Information

Published : 2024-04-02 21:15

Updated : 2025-06-20 18:15


NVD link : CVE-2024-30370

Mitre link : CVE-2024-30370

CVE.ORG link : CVE-2024-30370


JSON object : View

Products Affected

rarlab

  • winrar
CWE
CWE-693

Protection Mechanism Failure