Miggo Logo

CVE-2023-38496: Ineffective privileges drop when requesting container network

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.12427%
Published
7/25/2023
Updated
11/5/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/apptainer/apptainergo>= 1.2.0, < 1.2.11.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper privilege management in setuid operations introduced in PR #1523 and fixed in PR #1578. The key functions handling privilege escalation/dropping (Escalate/Drop in priv_linux.go) were modified in the fix to restore proper setresuid behavior. The original implementation's use of syscall.Setresuid without thread-locking considerations left privileged operations active, matching the CWE-269 (Improper Privilege Management) classification. The direct correlation between the vulnerability description, CWE mapping, and the patched functions in the referenced PRs provides high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *ix *ttps://*it*u*.*om/*ppt*in*r/*ppt*in*r/pull/**** in*lu*** in *ppt*in*r *.*.*-r*.* **s intro*u*** *n in*****tiv* privil*** *rop w**n r*qu*stin* *ont*in*r n*twork s*tup, t**r**or* su*s*qu*nt *un*tions *r* **ll** wit* root privil***s. T

Reasoning

T** vuln*r**ility st*ms *rom improp*r privil*** m*n***m*nt in s*tui* op*r*tions intro*u*** in PR #**** *n* *ix** in PR #****. T** k*y *un*tions **n*lin* privil*** *s**l*tion/*roppin* (*s**l*t*/*rop in priv_linux.*o) w*r* mo*i*i** in t** *ix to r*stor
CVE-2023-38496: Apptainer Net Priv Escalation | Miggo