SQL Injection Vulnerability in Schneider Electric U.motion Builder Software
CVE-2018-7765

8.8HIGH

Key Information:

Status
Vendor
CVE Published:
3 July 2018

What is CVE-2018-7765?

An SQL injection vulnerability has been identified in the U.motion Builder software from Schneider Electric, specifically within the track_import_export.php file. This issue allows an attacker to manipulate the object_id input parameter, which may result in unauthorized access to the underlying SQLite database. This vulnerability can potentially expose sensitive information or enable malicious actors to execute harmful commands without proper authentication.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

U.Motion U.motion Builder Software, all versions prior to v1.3.4

References

EPSS Score

17% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.