WinSCP < 3.8.2 Arbitrary Command Insertion

high Nessus Network Monitor Plugin ID 3648

Synopsis

The remote host is vulnerable to an arbitrary 'command insertion' flaw.

Description

The remote host is running WinSCP, a file transfer application that utilizes Secure Shell (SSH) as the transport protocol. This version of WinSCP is vulnerable to a flaw in the way that it parses URI strings. An attacker exploiting this flaw would need to be able to convince a WinSCP user to click on a malicious URI. Successful exploitation would result in the attacker executing arbitrary commands with the rights of the user running WinSCP.

Solution

Upgrade to version 3.8.2 or higher.

Plugin Details

Severity: High

ID: 3648

Family: SSH

Published: 6/12/2006

Updated: 3/6/2019

Nessus ID: 21737

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 7.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:winscp:winscp

Reference Information

CVE: CVE-2006-3015

BID: 18384