A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-47039 | Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 | Mailing List Patch |
https://bugzilla.redhat.com/show_bug.cgi?id=2249525 | Issue Tracking |
https://access.redhat.com/security/cve/CVE-2023-47039 | Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 | Mailing List Patch |
https://bugzilla.redhat.com/show_bug.cgi?id=2249525 | Issue Tracking |
https://perldoc.perl.org/perl5382delta#CVE-2023-47039-Perl-for-Windows-binary-hijacking-vulnerability | |
https://security.netapp.com/advisory/ntap-20240208-0005/ |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/security/cve/CVE-2023-47039 - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2249525 - Issue Tracking |
06 Nov 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Mar 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jan 2024, 19:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Perl perl
Perl Microsoft windows Microsoft |
|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2249525 - Issue Tracking | |
References | () https://access.redhat.com/security/cve/CVE-2023-47039 - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch |
02 Jan 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-02 06:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47039
Mitre link : CVE-2023-47039
CVE.ORG link : CVE-2023-47039
JSON object : View
Products Affected
perl
- perl
microsoft
- windows