⚠ Actively exploited
Added to CISA KEV on 2022-04-15. Federal agencies required to patch by 2022-05-06. Required action: The impacted product is end-of-life and should be disconnected if still in use..

CVE-2018-7841SQL Injection in Builder Software Version 1.3.4

CWE-89SQL Injection9 documents8 sources
Severity
9.8CRITICALNVD
EPSS
55.5%
top 1.91%
CISA KEV
KEV
Added 2022-04-15
Due 2022-05-06
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMay 22
KEV addedApr 15
KEV dueMay 6
Latest updateMay 24
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.

Description

A SQL Injection (CWE-89) vulnerability exists in U.motion Builder software version 1.3.4 which could cause unwanted code execution when an improper set of characters is entered.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5u.motion/u.motion_builder_software_version_1.3.4U.motion Builder software version 1.3.4

🔴Vulnerability Details

3
GHSA
GHSA-cwjr-6hc3-vpjm: A SQL Injection (CWE-89) vulnerability exists in U2022-05-24
CVEList
CVE-2018-7841: A SQL Injection (CWE-89) vulnerability exists in U2019-05-22
VulnCheck
Schneider Electric U.motion Builder SQL Injection Vulnerability2018

💥Exploits & PoCs

2
Exploit-DB
Schneider Electric U.Motion Builder 1.3.4 - 'track_import_export.php object_id' Unauthenticated Command Injection2019-05-14
Nuclei
Schneider Electric U.motion Builder - Remote Code Execution

🔍Detection Rules

2
Suricata
ET EXPLOIT Attempted Remote Command Injection Outbound (CVE-2018-7841)2019-06-11
Suricata
ET EXPLOIT Attempted Remote Command Injection Inbound (CVE-2018-7841)2019-06-11

📋Vendor Advisories

1
CISA
Schneider Electric U.motion Builder SQL Injection Vulnerability2022-04-15
CVE-2018-7841 — SQL Injection | cvebase