The vulnerability exists within processing of applets which are exposed on the web service in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-19484 | The vulnerability exists within processing of applets which are exposed on the web service in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: schneider
Published:
Updated: 2024-09-16T23:22:06.635Z
Reserved: 2018-03-08T00:00:00
Link: CVE-2018-7772
No data.
Status : Modified
Published: 2018-07-03T14:29:00.913
Modified: 2024-11-21T04:12:42.453
Link: CVE-2018-7772
No data.
OpenCVE Enrichment
No data.
EUVD