Lucene search

K
cveCERTVDECVE-2022-40976
HistoryNov 24, 2022 - 10:15 a.m.

CVE-2022-40976

2022-11-2410:15:10
CWE-22
CERTVDE
web.nvd.nist.gov
56
14
pilz
path traversal
vulnerability
zipped file
zip-slip
nvd
cve-2022-40976

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

21.7%

A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes (‘zip-slip’). File writes do not affect confidentiality or availability.

Affected configurations

Nvd
Node
pilzpss_4000Match-
AND
pilzpas_4000Range<1.25.0
Node
plizpascalRange1.9.1
OR
plizpasconnectRange<1.4.0
OR
plizpasmotionRange<1.4.1
OR
plizpnozmulti_configuratorRange<10.14.4long_term_support
OR
plizpnozmulti_configuratorRange<11.2.0-
VendorProductVersionCPE
pilzpss_4000-cpe:2.3:h:pilz:pss_4000:-:*:*:*:*:*:*:*
pilzpas_4000*cpe:2.3:o:pilz:pas_4000:*:*:*:*:*:*:*:*
plizpascal*cpe:2.3:a:pliz:pascal:*:*:*:*:*:*:*:*
plizpasconnect*cpe:2.3:a:pliz:pasconnect:*:*:*:*:*:*:*:*
plizpasmotion*cpe:2.3:a:pliz:pasmotion:*:*:*:*:*:*:*:*
plizpnozmulti_configurator*cpe:2.3:a:pliz:pnozmulti_configurator:*:*:*:*:long_term_support:*:*:*
plizpnozmulti_configurator*cpe:2.3:a:pliz:pnozmulti_configurator:*:*:*:*:-:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PAScal",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThanOrEqual": "1.9.1",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "PASconnect",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThan": "1.4.0",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "PASmotion",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThan": "1.4.1",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "PNOZmulti Configurator",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThan": "11.2.0",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "PNOZmulti Configurator LTS",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThan": "10.14.4",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "PAS4000",
    "vendor": "PILZ",
    "versions": [
      {
        "lessThan": "1.25.0",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver"
      }
    ]
  }
]

Social References

More

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

21.7%

Related for CVE-2022-40976