WinSCP < 4.0.4 URL Protocol Handler Arbitrary File Transfer

medium Nessus Network Monitor Plugin ID 4214

Synopsis

The remote Windows host has a program that allows arbitrary file access.

Description

According to its version, the installation of WinSCP on the remote host fails to completely sanitize input to the SCP and SFTP protocol handlers. If an attacker can trick a user on the affected host into clicking on a malicious link, he may be able to initiate a file transfer to or from the affected host.

Solution

Upgrade to version 4.0.4 or higher.

See Also

http://winscp.net/eng/docs/history#4.0.4

http://www.securityfocus.com/archive/1/479298/30/0/threaded

Plugin Details

Severity: Medium

ID: 4214

Family: SSH

Published: 9/14/2007

Updated: 3/6/2019

Nessus ID: 26027

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.2

Temporal Score: 3.9

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:winscp:winscp

Reference Information

CVE: CVE-2007-4909

BID: 25655