WinSCP URL Protocol Handler Arbitrary File Transfer

High Nessus Plugin ID 26027


The remote Windows host has a program that allows arbitrary file access.


According to its version, the installation of WinSCP on the remote host fails to completely sanitize input to the SCP and SFTP protocol handlers. If an attacker can trick a user on the affected host into clicking on a malicious link, a file transfer can be initiated to or from the affected host.


Upgrade to WinSCP version 4.0.4 or later.

See Also

Plugin Details

Severity: High

ID: 26027

File Name: winscp_uri_handler_file_access2.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2007/09/14

Modified: 2016/05/04

Dependencies: 72387

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:winscp:winscp

Required KB Items: installed_sw/WinSCP

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/09/03

Reference Information

CVE: CVE-2007-4909

BID: 25655

OSVDB: 40519

CWE: 264