Overview
A vulnerability has been found in WinSCP, which can be exploited by an attacker to overwrite or add files to the victim's computer.
Description
WinSCP is an open source SFTP client for Microsoft windows. It supports a file-manager user interface, and uses the SSH protocol to transfer files between hosts. If an attacker convinces a user to follow a specially crafted URL, a file may be directly transferred to the user's computer. The attacker may also be able to append information to files. Depending on what the user interface settings of WinSCP are, user-interaction may or may not be required to complete the file transfer. This vulnerability is a result of certain command line switches being passed to WinSCP in the malicious URL. |
Impact
If a victim user clicks on the specially-crafted URL, an attacker could send any chosen file to the victim's computer with access to folders that the user running WinSCP has write access to. The attacker could also append information to a file that may damage the file or make it unusable. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Jelmer Kuperus.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2006-3015 |
Severity Metric: | 0.79 |
Date Public: | 2006-06-11 |
Date First Published: | 2006-06-22 |
Date Last Updated: | 2006-07-07 18:11 UTC |
Document Revision: | 16 |