(0Day) Schneider Electric U.motion Builder track_import_export SQL Injection Remote Code Execution Vulnerability

ID ZDI-17-378
Type zdi
Reporter rgod
Modified 2017-06-12T00:00:00


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric U.motion Builder. Authentication is not required to exploit this vulnerability.

The specific flaw exists within processing of track_import_export.php, which is exposed on the web service with no authentication. The underlying SQLite database query is subject to SQL injection on the object_id input parameter when the export operation is chosen on the applet call. A remote attacker can leverage this vulnerability to execute arbitrary commands against the database.