First published: Wed Jun 14 2006(Updated: )
Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote attackers to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinSCP | =3.8.1_build328 | |
WinSCP | =3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3015 has been classified as having a medium severity rating due to its potential for file manipulation.
To fix CVE-2006-3015, users should upgrade to a later version of WinSCP beyond 3.8.1 build 328.
CVE-2006-3015 affects WinSCP versions 3.8.1 build 328 and 3.8.1.
CVE-2006-3015 can be exploited by using specially crafted SCP or SFTP URIs containing encoded spaces and double-quote characters.
Any user utilizing WinSCP version 3.8.1 build 328 or 3.8.1 is potentially vulnerable to CVE-2006-3015.