{"api_version":"1","generated_at":"2026-04-14T07:18:45+00:00","cve":"CVE-2023-38496","urls":{"html":"https://cve.report/CVE-2023-38496","api":"https://cve.report/api/cve/CVE-2023-38496.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-38496","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-38496"},"summary":{"title":"CVE-2023-38496","description":"Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-07-25 22:15:00","updated_at":"2023-08-02 19:32:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/apptainer/apptainer/pull/1523","name":"https://github.com/apptainer/apptainer/pull/1523","refsource":"MISC","tags":[],"title":"Set real UID to zero when escalating privileges for CNI plugins to fix issue appeared with RHEL 9.X (release 1.2) by cclerget · Pull Request #1523 · apptainer/apptainer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apptainer/apptainer/pull/1578","name":"https://github.com/apptainer/apptainer/pull/1578","refsource":"MISC","tags":[],"title":"Restore old syscall setresuid behavior when escalating/dropping privileges. by cclerget · Pull Request #1578 · apptainer/apptainer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx","name":"https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx","refsource":"MISC","tags":[],"title":"Ineffective privileges drop when requesting container network · Advisory · apptainer/apptainer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-38496","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38496","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"38496","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lfprojects","cpe5":"apptainer","cpe6":"1.2.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"38496","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lfprojects","cpe5":"apptainer","cpe6":"1.2.0","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"go","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-38496","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-271: Privilege Dropping / Lowering Errors","cweId":"CWE-271"}]},{"description":[{"lang":"eng","value":"CWE-269: Improper Privilege Management","cweId":"CWE-269"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"apptainer","product":{"product_data":[{"product_name":"apptainer","version":{"version_data":[{"version_affected":"=","version_value":">= 1.2.0-rc.2, < 1.2.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx","refsource":"MISC","name":"https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx"},{"url":"https://github.com/apptainer/apptainer/pull/1523","refsource":"MISC","name":"https://github.com/apptainer/apptainer/pull/1523"},{"url":"https://github.com/apptainer/apptainer/pull/1578","refsource":"MISC","name":"https://github.com/apptainer/apptainer/pull/1578"}]},"source":{"advisory":"GHSA-mmx5-32m4-wxvx","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-25 22:15:00","lastModifiedDate":"2023-08-02 19:32:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":3.3,"baseSeverity":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:lfprojects:apptainer:1.2.0:rc2:*:*:*:go:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:lfprojects:apptainer:1.2.0:-:*:*:*:go:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}