The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-28291 | RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page. The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156. |
Thu, 26 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Jun 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rarlab
Rarlab winrar |
|
| CPEs | cpe:2.3:a:rarlab:winrar:7.00:beta4:*:*:*:*:*:* | |
| Vendors & Products |
Rarlab
Rarlab winrar |
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-02T01:32:07.042Z
Reserved: 2024-03-26T18:52:36.419Z
Link: CVE-2024-30370
Updated: 2024-08-02T01:32:07.042Z
Status : Analyzed
Published: 2024-04-02T21:15:50.403
Modified: 2025-06-20T18:15:03.657
Link: CVE-2024-30370
No data.
OpenCVE Enrichment
No data.
EUVD