First published: Thu Apr 05 2018(Updated: )
The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric U.motion Builder | <1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7765 is a vulnerability that exists within the processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.
Schneider Electric U.motion Builder software versions prior to v1.3.4 are affected by CVE-2018-7765.
CVE-2018-7765 has a severity rating of high, with a CVSS score of 8.8.
To fix CVE-2018-7765, it is recommended to upgrade Schneider Electric U.motion Builder software to version 1.3.4 or later.
More information about CVE-2018-7765 can be found in the following references: - [http://seclists.org/fulldisclosure/2019/May/26](http://seclists.org/fulldisclosure/2019/May/26) - [https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/](https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/)