Vulnerability Description
The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | U.Motion Builder | < 1.3.4 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2019/May/26
- https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/Vendor Advisory
- http://seclists.org/fulldisclosure/2019/May/26
- https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/Vendor Advisory
FAQ
What is CVE-2018-7765?
CVE-2018-7765 is a vulnerability with a CVSS score of 8.8 (HIGH). The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL i...
How severe is CVE-2018-7765?
CVE-2018-7765 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7765?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric U.Motion Builder.