Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-40976
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PILZ: Multiple products affected by ZipSlip
Source: NVD (National Vulnerability Database)
Vulnerability Description
A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Pilz产品路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Pilz PASvisu等都是德国皮尔磁(Pilz)公司的产品。Pilz PASvisu是一款用于机器可视化的 HMI 解决方案。Pilz PAS4000是一个自动化系统 PSS 4000 的软件平台。Pilz PAScal是一个应用程序。 Pilz 多款产品存在路径遍历漏洞。未经身份验证的本地攻击者可以使用压缩的恶意配置文件来触发任意文件写入。以下产品及版本受到影响:Pilz PASmotion,Pilz PASconnect,Pilz PAScal,Pilz PAS4000,Pilz PASvisu。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
PILZPAScal 1.0.0 ~ 1.9.1 -
PILZPASconnect 1.0.0 ~ 1.4.0 -
PILZPASmotion 1.0.0 ~ 1.4.1 -
PILZPNOZmulti Configurator 1.0.0 ~ 11.2.0 -
PILZPNOZmulti Configurator LTS 1.0.0 ~ 10.14.4 -
PILZPAS4000 1.0.0 ~ 1.25.0 -
II. Public POCs for CVE-2022-40976
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-40976
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-40976

No comments yet


Leave a comment