SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Schneider Electric U.Motion Builder command injection attempt
This event is generated when a command injection attempt against Scheider Electric U.Motion Builder devices is detected. Impact: Web Application Attack Details: The script "track_import_export.php" is vulnerable to an unauthenticated command injection vulnerability when user-supplied input to the HTTP GET/POST parameter "object_id" is processed by the web application. Since the application does not properly validate and sanitize this parameter, it is possible to inject arbitrary commands into a PHP exec call. Ease of Attack: Simple, a public proof of concept exists.
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2018-7841 |
Loading description
|