OS command injection in U.motion Builder - CVE-2018-7785

 

OS command injection in U.motion Builder - CVE-2018-7785

Published: June 13, 2018


Vulnerability identifier: #VU13330
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-7785
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Schneider Electric
Affected software:
U.motion Builder

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote unauthenticated attacker can supply specially crafted content, inject and execute arbitrary shell commands, bypass authentication and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


How to mitigate CVE-2018-7785

Update to version 1.3.4.

Sources