WinSCP URL Protocol Handler Arbitrary File Transfer

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a program that allows arbitrary file
access.

Description :

According to its version, the installation of WinSCP on the remote
host fails to completely sanitize input to the SCP and SFTP protocol
handlers. If an attacker can trick a user on the affected host into
clicking on a malicious link, a file transfer can be initiated to or
from the affected host.

See also :

http://www.securityfocus.com/archive/1/479298/30/0/threaded
http://winscp.net/eng/docs/history#4.0.4

Solution :

Upgrade to WinSCP version 4.0.4 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 26027 ()

Bugtraq ID: 25655

CVE ID: CVE-2007-4909

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now