First published: Wed Jan 27 2021(Updated: )
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Winscp Winscp | <5.17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3331 is a vulnerability in WinSCP before version 5.17.10 that allows remote attackers to execute arbitrary programs by exploiting a crafted URL that loads session settings.
CVE-2021-3331 has a severity rating of 9.8 (critical).
CVE-2021-3331 affects WinSCP versions prior to 5.17.10.
To fix CVE-2021-3331, you should update WinSCP to version 5.17.10 or later.
Yes, you can find more information about CVE-2021-3331 at the following references: [GitHub Commit](https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d), [Version History](https://winscp.net/eng/docs/history#5.17.10), [Raw Settings](https://winscp.net/eng/docs/rawsettings).