### [CVE-2018-7765](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7765) ![](https://img.shields.io/static/v1?label=Product&message=U.Motion&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=SQL%20Injection%20Remote%20Code%20Execution&color=brighgreen) ### Description The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter. ### POC #### Reference - http://seclists.org/fulldisclosure/2019/May/26 - http://seclists.org/fulldisclosure/2019/May/26 #### Github - https://github.com/ARPSyndicate/cvemon