WinSCP < 3.8.2 Arbitrary Command Insertion

High Nessus Network Monitor Plugin ID 3648

Synopsis

The remote host is vulnerable to an arbitrary 'command insertion' flaw.

Description

The remote host is running WinSCP, a file transfer application that utilizes Secure Shell (SSH) as the transport protocol. This version of WinSCP is vulnerable to a flaw in the way that it parses URI strings. An attacker exploiting this flaw would need to be able to convince a WinSCP user to click on a malicious URI. Successful exploitation would result in the attacker executing arbitrary commands with the rights of the user running WinSCP.

Solution

Upgrade to version 3.8.2 or higher.

Plugin Details

Severity: High

ID: 3648

File Name: 3648.prm

Family: SSH

Published: 2006/06/12

Modified: 2016/02/05

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.1

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 7.4

Temporal Score: 7.2

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Reference Information

CVE: CVE-2006-3015

BID: 18384