Description
The vulnerability exists within processing of applets which are exposed on the web service in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.
Published: 2018-07-03
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-19484 The vulnerability exists within processing of applets which are exposed on the web service in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.
History

No history.

Subscriptions

Schneider-electric U.motion Builder
cve-icon MITRE

Status: PUBLISHED

Assigner: schneider

Published:

Updated: 2024-09-16T23:22:06.635Z

Reserved: 2018-03-08T00:00:00.000Z

Link: CVE-2018-7772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-03T14:29:00.913

Modified: 2024-11-21T04:12:42.453

Link: CVE-2018-7772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses