First published: Thu Apr 05 2018(Updated: )
The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric U.motion Builder | <1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7777 is a vulnerability in Schneider Electric U.motion Builder software versions prior to v1.3.4 that allows a remote, authenticated attacker to execute arbitrary commands.
CVE-2018-7777 occurs due to insufficient handling of the update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4.
CVE-2018-7777 has a severity rating of 8.8 out of 10 (high severity).
CVE-2018-7777 can be exploited by a remote, authenticated attacker by sending a crafted request to the target server.
To fix CVE-2018-7777, it is recommended to update Schneider Electric U.motion Builder software to version v1.3.4 or above.