(0Day) Schneider Electric U.motion Builder loadtemplate SQL Injection Remote Code Execution Vulnerability

ID ZDI-17-374
Type zdi
Reporter rgod
Modified 2017-06-22T00:00:00


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric U.motion Builder. Authentication is not required to exploit this vulnerability. The specific flaw exists within processing of loadtemplate.php, which is exposed on the web service with no authentication. The underlying SQLite database query is subject to SQL injection on the tpl input parameter. A remote attacker can leverage this vulnerability to execute arbitrary commands against the database.