![]() ![]() This is interesting as Windows doesn’t allow files and folders to have the same name in the same path.We can also see that the threat actor can craft the archive so that folder and file names are the same.The image below shows that the archive is named trading_system, which hints that it is used to target traders.Our intelligence shows that this vulnerability is being exploited as early as April 2023. JPG file) and also a folder that has the same name as the harmless file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. ![]() The issue occurs because a ZIP archive may include a benign file (such as an ordinary. It is related to an RCE vulnerability in WinRAR before version 6.23. On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |