First published: Tue Jul 03 2018(Updated: )
The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric U.motion Builder | <1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-7764.
The title of the vulnerability is 'The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software...'
The vulnerability is a directory traversal vulnerability in the processing of the 's' parameter of the applet.
The Schneider Electric U.motion Builder software versions prior to v1.3.4 are affected.
The severity of the vulnerability is medium with a CVSS score of 4.3.
Update the Schneider Electric U.motion Builder software to version 1.3.4 or later.
You can find more information about the vulnerability at the following link: [Schneider Electric Security Notification](https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/)
The CWE ID for the vulnerability is CWE-22.