Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7765 PoC — Schneider Electric U.motion Builder软件SQL注入漏洞

Source
Associated Vulnerability
Title:Schneider Electric U.motion Builder软件SQL注入漏洞 (CVE-2018-7765)
Description:Schneider Electric U.motion Builder software是法国施耐德电气(Schneider Electric)公司的一套为U.motion(楼宇自动化管理设备)创建自动化程序的工具。 Schneider Electric U.motion Builder软件1.3.4之前版本中的track_import_export.php文件存在SQL注入漏洞。远程攻击者可借助‘object_id’输入参数利用该漏洞执行代码。
Description
The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.
File Snapshot

id: CVE-2018-7765 info: name: Schneider Electric U.motion Builder - SQL Injection author: daffa ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.