Description
Argument injection vulnerability in WinSCP 3.8.1 build 328 allows remote attackers to upload or download arbitrary files via encoded spaces and double-quote characters in a scp or sftp URI.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jelmer Kuperus · textremotewindows
https://www.exploit-db.com/exploits/28007
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/27075
Broken Link vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/2289
Release Notes x_refsource_confirm
http://winscp.net/eng/docs/history#3.8.2
Broken Link, Exploit mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046810.html
Broken Link mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0196.html
Broken Link, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/20575
Broken Link, Exploit, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/18384
Third Party Advisory, US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/912588
Scores
EPSS
0.1757
EPSS Percentile
95.1%
Details
CWE
CWE-88
Status
published
Products (1)
winscp/winscp
3.8.1
Published
Jun 14, 2006
Tracked Since
Feb 18, 2026