René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

166 lines
4.7 KiB
JSON

{
"id": "CVE-2022-40976",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-11-24T10:15:10.530",
"lastModified": "2023-02-03T16:13:06.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:pilz:pas_4000:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.25.0",
"matchCriteriaId": "3582EE4B-DB57-4DE2-B996-70989FD0C382"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:pilz:pss_4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "670D7E93-F5CE-4525-9CF8-F985FD491FE8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pliz:pascal:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.9.1",
"matchCriteriaId": "76937494-10AA-4666-9613-D70F79F39DBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pliz:pasconnect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "8C03F704-A5FB-4813-81AB-1B0EC85A8B92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pliz:pasmotion:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.1",
"matchCriteriaId": "43AE962D-8D55-4BA2-AEB9-3F55085671B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pliz:pnozmulti_configurator:*:*:*:*:long_term_support:*:*:*",
"versionEndExcluding": "10.14.4",
"matchCriteriaId": "0B07EEA2-1AD4-49EB-B644-72A1F0CE3AF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pliz:pnozmulti_configurator:*:*:*:*:-:*:*:*",
"versionEndExcluding": "11.2.0",
"matchCriteriaId": "6A1B91BA-0E87-4F60-B11C-5EDC16AD1C0A"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-044/",
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-045/",
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}