« List of all CVEs

CVE-2023-47039

Perl: perl for windows binary hijacking vulnerability

Published: 1/2/2024 Last updated: 11/20/2025 Reserved: 10/30/2023

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.8 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Opam packages affected (3)

bap-std conf-perl goblint-cil

Products affected (9)

Product Vendor Version
< a426e8a6ae161f51888585b065db0f8f93ab2e16
Red Hat Enterprise Linux 6 Red Hat < d2c60a8a387e9fcc28447ef36c03f8e49fd052a6
Red Hat Enterprise Linux 7 Red Hat < d42bbd8f30ac38b1ce54715bf08ec3dac18d6b25
Red Hat Enterprise Linux 8 Red Hat < 19d5036e7ad766cf212aebec23b9f1d7924a62bc
<= <= 1.9.2
Red Hat Enterprise Linux 6 Red Hat <= <= 1.0.14
Red Hat Enterprise Linux 9 Red Hat < 3.14
Red Hat Enterprise Linux 8 Red Hat < 1010b4c012b0d78dfb9d3132b49aa2ef024a07a7
Red Hat Enterprise Linux 8 Red Hat 3.14

References (16)