Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-47039

Опубликовано: 02 янв. 2024
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS3: 7.8

Описание

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (cmd.exe). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute cmd.exe within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to placecmd.exe in locations with weak permissions, such as C:\ProgramData. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

ignored

only affects Perl for Windows
esm-infra-legacy/trusty

ignored

only affects Perl for Windows
esm-infra/bionic

ignored

only affects Perl for Windows
esm-infra/focal

ignored

only affects Perl for Windows
esm-infra/xenial

ignored

only affects Perl for Windows
focal

ignored

end of standard support, was ignored [only affects Perl for Windows]
jammy

ignored

only affects Perl for Windows
lunar

ignored

end of life, was ignored [only affects Perl for Windows]
mantic

ignored

end of life, was ignored [only affects Perl for Windows]

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/bionic

ignored

only affects Perl for Windows
esm-apps/focal

ignored

only affects Perl for Windows
focal

ignored

end of standard support, was ignored [only affects Perl for Windows]
jammy

DNE

lunar

DNE

mantic

DNE

trusty

ignored

end of standard support
upstream

ignored

only affects Perl for Windows

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

ignored

only affects Perl for Windows
esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

ignored

end of life, was ignored [only affects Perl for Windows]
mantic

ignored

end of life, was ignored [only affects Perl for Windows]
trusty

ignored

end of standard support
upstream

ignored

only affects Perl for Windows
xenial

ignored

end of standard support

Показывать по

Ссылки на источники

EPSS

Процентиль: 26%
0.00089
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
около 2 лет назад

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

CVSS3: 7.8
nvd
около 2 лет назад

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

CVSS3: 7.8
debian
около 2 лет назад

A vulnerability was found in Perl. This security issue occurs while Pe ...

CVSS3: 7.8
github
около 2 лет назад

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

CVSS3: 5.3
fstec
около 2 лет назад

Уязвимость языка программирования Perl, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 26%
0.00089
Низкий

7.8 High

CVSS3