Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of shared folders. When syncing files from a shared folder belonging to an untrusted account, the Dropbox desktop application does not apply the Mark-of-the-Web to the local files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23991.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-677/ |
History
Sat, 23 Nov 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dropbox dropbox Desktop
|
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:dropbox:dropbox_desktop:198.4.7615:*:*:*:*:*:*:* | |
Vendors & Products |
Dropbox dropbox Desktop
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: zdi
Published: 2024-06-13T19:40:13.179Z
Updated: 2024-08-01T21:25:03.164Z
Reserved: 2024-06-12T19:05:13.638Z
Link: CVE-2024-5924
Vulnrichment
Updated: 2024-07-15T17:00:28.634Z
NVD
Status : Analyzed
Published: 2024-06-13T20:15:16.000
Modified: 2024-11-23T00:42:38.983
Link: CVE-2024-5924
Redhat
No data.