First published: Tue Jul 03 2018(Updated: )
The vulnerability exists within processing of track_getdata.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric U.motion Builder | <1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7766 is a vulnerability that exists within the processing of track_getdata.php in Schneider Electric U.motion Builder software versions prior to v1.3.4.
The vulnerability allows for SQL injection on the id input parameter, which could lead to unauthorized access, data theft, and potential compromise of the affected system.
If you are running Schneider Electric U.motion Builder software versions prior to v1.3.4, your system may be affected by CVE-2018-7766.
Yes, upgrading to Schneider Electric U.motion Builder software version 1.3.4 or higher fixes the vulnerability.
You can find more information about CVE-2018-7766 on the Schneider Electric website at https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/