CVE-2021-3331

critical

Description

WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

References

https://winscp.net/tracker/1943

https://winscp.net/eng/docs/rawsettings

https://winscp.net/eng/docs/history#5.17.10

https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d

Details

Source: Mitre, NVD

Published: 2021-01-27

Updated: 2021-02-04

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical