10
CVSSv2

CVE-2021-3331

Published: 27/01/2021 Updated: 04/02/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

WinSCP prior to 5.17.10 allows remote malicious users to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

winscp winscp

Github Repositories

Just a quick update of my work Nothing is perfect, but some updates to others who may find it usefull TL;DR Found a way to run an installer User interaction needed Shabby work Update 1 CVE-2021-3331 can be used to open calcexe, reverse shell yet to be tried