[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-20684Date: (C)2019-03-29   (M)2023-12-22


In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 6.4
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: NONEAvailability: PARTIAL
Integrity: HIGH 
Availability: NONE 
  
Reference:
BID-106526
https://github.com/winscp/winscp/commit/49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://winscp.net/eng/docs/history
https://winscp.net/tracker/1675
https://www.oracle.com/security-alerts/cpujan2020.html

CPE    1
cpe:/a:winscp:winscp
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:2103513
oval:org.secpod.oval:def:50196

© SecPod Technologies