{"id":36963,"date":"2025-01-22T19:16:20","date_gmt":"2025-01-22T18:16:20","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=36963"},"modified":"2025-01-22T19:16:20","modified_gmt":"2025-01-22T18:16:20","slug":"7-zip-vulnerability-allows-mow-bypass","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/01\/22\/7-zip-vulnerability-allows-mow-bypass\/","title":{"rendered":"7-ZIP vulnerability allows MoW bypass"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"182\" height=\"121\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/01\/22\/7-zip-schwachstelle-ermoeglicht-mow-bypass\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]There is a vulnerability in the archive program 7-Zip for Windows that can become critical when unpacking archives. The \"Mark of Web\" label for downloads can be removed when unpacking. There is already an update to fix the vulnerability.<\/p>\n<p><!--more--><\/p>\n<h2>Vulnerability CVE-2025-0411 in 7-Zip<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/1f6312f4fc8e4b5d8c54d17df3ee2350\" alt=\"\" width=\"1\" height=\"1\" \/>The Zero-Day-Initiative (ZDI) has published the security advisory 7-Zip Mark-of-the-Web Bypass Vulnerability<a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-25-045\/\" target=\"_blank\" rel=\"noopener\">7-Zip Mark-of-the-Web Bypass Vulnerability<\/a> for the vulnerability <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-0411\">CVE-2025-0411<\/a> in 7-ZIP. The vulnerability, which has a CVSs 3.1 score of 7.0, allows remote attackers to bypass the Windows mark-of-the-web protection mechanism via the 7-Zip program.<\/p>\n<blockquote><p>Mark-of-the-Web (MoW) is a protection mechanism developed by Microsoft in which downloads from the Internet are marked with a flag in the files. Windows can then display a warning when the file is called up that it is a download that could be unsafe.<\/p><\/blockquote>\n<p>However, user interaction is required to exploit this vulnerability, as the target must visit a malicious site or download a malicious file and then open it.<\/p>\n<p>The vulnerability exists when handling archived files. When extracting files from a manipulated archive that carries the Mark-of-the-Web, 7-Zip does not apply the Mark-of-the-Web flag to the files extracted from the archive.<\/p>\n<p>An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user. The vulnerability was reported to the developer on October 1, 2024. The whole thing is fixed in 7-Zip version 24.09. This version has been available for download on <a href=\"https:\/\/7-zip.org\/\" target=\"_blank\" rel=\"noopener\">this website<\/a> since the end of November 2024. Thanks to the blog reader for pointing out <a href=\"https:\/\/www.heise.de\/news\/7-Zip-Luecke-erlaubt-Umgehung-von-Mark-of-the-Web-10250351.html\" target=\"_blank\" rel=\"noopener\">this heise article<\/a> on the topic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is a vulnerability in the archive program 7-Zip for Windows that can become critical when unpacking archives. The \"Mark of Web\" label for downloads can be removed when unpacking. There is already an update to fix the vulnerability.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-36963","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=36963"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36963\/revisions"}],"predecessor-version":[{"id":36964,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36963\/revisions\/36964"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=36963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=36963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=36963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}