First published: Tue Jul 03 2018(Updated: )
The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric U.motion Builder | <1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.
CVE-2018-7767 has a severity value of 8.8 (high).
Schneider Electric U.motion Builder software versions prior to v1.3.4 are affected by CVE-2018-7767.
To fix CVE-2018-7767, it is recommended to update Schneider Electric U.motion Builder software to version 1.3.4 or later.
You can find more information about CVE-2018-7767 at the following link: [Schneider Electric Security Advisory SEVD-2018-095-01](https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/).