A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.
History

Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Wed, 06 Nov 2024 15:45:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-01-02T05:30:53.168Z

Updated: 2025-06-17T20:29:05.501Z

Reserved: 2023-10-30T13:58:15.255Z

Link: CVE-2023-47039

cve-icon Vulnrichment

Updated: 2024-08-02T21:01:22.573Z

cve-icon NVD

Status : Modified

Published: 2024-01-02T06:15:13.737

Modified: 2024-11-21T08:29:39.083

Link: CVE-2023-47039

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-25T00:00:00Z

Links: CVE-2023-47039 - Bugzilla