Vulnerability CVE-2021-3331


Published: 2021-01-27   Modified: 2021-01-28

Description:
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

Type:

NVD-CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Winscp -> Winscp 

 References:
https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d
https://winscp.net/eng/docs/history#5.17.10
https://winscp.net/eng/docs/rawsettings
https://winscp.net/tracker/1943

Copyright 2022, cxsecurity.com

 

Back to Top