CVSS 3.1 Score 8.8 of 10 (high)


Published Aug 7, 2023
Updated: Aug 11, 2023


CVE-2023-39523 is a command injection vulnerability found in prior to version 32.5.1. This vulnerability affects several products, including sTefiy, sTefiz, sTefiw, and others. The vulnerability exists in the docker fetch process where the `docker_reference` parameter allows appending malicious commands. The vulnerable function `get_docker_image_platform` constructs a shell command using the `docker_reference` input without sanitization, making it susceptible to command injections. An attacker who can add or create inputs to a project can exploit this vulnerability to inject commands and potentially cause damage. The risk score for this vulnerability is 65 out of 100, with a base severity rating of HIGH according to [email protected].

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-39523 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options