Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2007-4909

CVE information

Published

16 years ago

Last Modified

5 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Interpretation conflict in WinSCP before 4.0.4 allows remote attackers to perform arbitrary file transfers with a remote server via file-transfer commands in the final portion of a (1) scp, and possibly a (2) sftp or (3) ftp, URL, as demonstrated by a URL specifying login to the remote server with a username of scp, which is interpreted as an HTTP scheme name by the protocol handler in a web browser, but is interpreted as a username by WinSCP. NOTE: this is related to an incomplete fix for CVE-2006-3015..

CVSSv2.0 Score

Severity
High
Base Score
9.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:winscp:winscp:2.0.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.6.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.6.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.5.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:4.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.6.5_beta:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.8.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.8.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:3.5.5_beta:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:winscp:winscp:4.0.2:*:*:*:*:*:*:*
  Yes
- -