CVE-2018-7785
https://notcve.org/view.php?id=CVE-2018-7785
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection allows authentication bypass. En el software de Schneider Electric U.motion Builder en versiones anteriores a la v1.3.4, una inyección de comandos remotos permite la omisión de autenticación. • http://www.securityfocus.com/bid/104447 https://www.schneider-electric.com/en/download/document/SEVD-2018-151-01 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2018-7786
https://notcve.org/view.php?id=CVE-2018-7786
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XSS) vulnerability exists which could allow injection of malicious scripts. En el software de Schneider Electric U.motion Builder en versiones anteriores a la v1.3.4, existe una vulnerabilidad Cross-Site Scripting (XSS) que podría permitir la inyección de scripts maliciosos. • http://www.securityfocus.com/bid/104447 https://www.schneider-electric.com/en/download/document/SEVD-2018-151-01 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-7766
https://notcve.org/view.php?id=CVE-2018-7766
The vulnerability exists within processing of track_getdata.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter. Existe una vulnerabilidad en el procesamiento de track_getdata.php en el software de Schneider Electric U.motion Builder en versiones anteriores a la v1.3.4. La consulta de la base de datos SQLite subyacente está sujeta a una inyección SQL en el parámetro de entrada id. • https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-7769
https://notcve.org/view.php?id=CVE-2018-7769
The vulnerability exists within processing of xmlserver.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter. Existe una vulnerabilidad en el procesamiento de xmlserver.php en el software de Schneider Electric U.motion Builder en versiones anteriores a la v1.3.4. La consulta de la base de datos SQLite subyacente está sujeta a una inyección SQL en el parámetro de entrada id. • https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-7777 – Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection
https://notcve.org/view.php?id=CVE-2018-7777
The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. En el software de Schneider Electric U.motion Builder en versiones anteriores a la v1.3.4., los clientes maliciosos pueden subir y provocar que el servidor smbd ejecute una librería compartida desde un recurso compartido modificable. • https://www.exploit-db.com/exploits/47991 http://packetstormsecurity.com/files/156184/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01 • CWE-20: Improper Input Validation •