Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-7765

CWE-89SQL Injection6 documents6 sources
Severity
8.8HIGH
EPSS
4.6%
top 10.78%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 3
Latest updateMay 14

Description

The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5schneider_electric_se/u.motionU.motion Builder Software, all versions prior to v1.3.4

🔴Vulnerability Details

3
GHSA
GHSA-4j9f-8935-x53p: The vulnerability exists within processing of track_import_export2022-05-14
CVEList
CVE-2018-7765: The vulnerability exists within processing of track_import_export2018-07-03
VulnCheck
Schneider Electric u.motion_builder Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')2018

💥Exploits & PoCs

1
Nuclei
Schneider Electric U.motion Builder - SQL Injection

💬Community

1
Bugzilla
CVE-2018-9838 ocaml: Integer overflow in byterun/bigarray.c:caml_ba_deserialize() allows remote attackers to cause a denial of service or other unspecified impact2018-04-10
CVE-2018-7765 (HIGH CVSS 8.8) | The vulnerability exists within pro | cvebase.io