Vulnerability Description
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Winscp | Winscp | < 5.17.10 |
References
- https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688dPatchThird Party Advisory
- https://winscp.net/eng/docs/history#5.17.10Release NotesVendor Advisory
- https://winscp.net/eng/docs/rawsettingsVendor Advisory
- https://winscp.net/tracker/1943PatchVendor Advisory
- https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688dPatchThird Party Advisory
- https://winscp.net/eng/docs/history#5.17.10Release NotesVendor Advisory
- https://winscp.net/eng/docs/rawsettingsVendor Advisory
- https://winscp.net/tracker/1943PatchVendor Advisory
FAQ
What is CVE-2021-3331?
CVE-2021-3331 is a vulnerability with a CVSS score of 9.8 (CRITICAL). WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default in...
How severe is CVE-2021-3331?
CVE-2021-3331 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-3331?
Check the references section above for vendor advisories and patch information. Affected products include: Winscp Winscp.