First published: Thu Nov 24 2022(Updated: )
A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pilz PASvisu | <1.12.0 | |
Pilz Pmi V507 Firmware | <=1.3.58 | |
Pilz Pmi V507 | ||
Pilz Pmi V512 Firmware | <=1.3.58 | |
Pilz Pmi V512 | ||
Pilz Pmi V704e Firmware | <2.2.0 | |
Pilz Pmi V704e | ||
Pilz Pmi V707e Firmware | <2.2.0 | |
Pilz Pmi V707e | ||
Pilz Pmi V807 Firmware | <1.6.102 | |
Pilz Pmi V807 | ||
Pilz Pmi V812 Firmware | <1.6.102 | |
Pilz Pmi V812 | ||
Pilz Pmi V815 Firmware | <1.6.102 | |
Pilz Pmi V815 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40977 is a path traversal vulnerability in Pilz PASvisu Server before version 1.12.0.
The CVE-2022-40977 vulnerability allows an unauthenticated remote attacker to use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip').
CVE-2022-40977 has a severity rating of high (7.5).
Pilz PASvisu Server version before 1.12.0 is affected by CVE-2022-40977.
The recommended fix for CVE-2022-40977 is to upgrade Pilz PASvisu Server to version 1.12.0 or later.