Home

Description

WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.

PUBLISHED Reserved 2024-09-13 | Published 2024-11-22 | Updated 2024-12-02 | Assigner zdi




HIGH: 7.8CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-693: Protection Mechanism Failure

Product status

Default status
unknown

28.0 (15640) 64-bit
affected

References

www.zerodayinitiative.com/advisories/ZDI-24-1234/ (ZDI-24-1234)

cve.org (CVE-2024-8811)

nvd.nist.gov (CVE-2024-8811)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.