Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote attackers to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/27075 | vdb entry third party advisory |
http://winscp.net/eng/docs/history#3.8.2 | release notes |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046810.html | mailing list exploit broken link |
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0196.html | mailing list broken link |
http://secunia.com/advisories/20575 | broken link third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/2289 | vdb entry broken link |
http://www.securityfocus.com/bid/18384 | exploit vdb entry third party advisory broken link |
http://www.kb.cert.org/vuls/id/912588 | third party advisory us government resource |