Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/apptainer@1.1.6-r0?arch=riscv64&distroversion=v3.21&reponame=community
Typeapk
Namespacealpine
Nameapptainer
Version1.1.6-r0
Qualifiers
arch riscv64
distroversion v3.21
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.8-r0
Latest_non_vulnerable_version1.1.8-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-b1v9-q2r1-gfcf
vulnerability_id VCID-b1v9-q2r1-gfcf
summary
scs-library-client may leak user credentials to third-party service via HTTP redirect
### Impact

When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download.

Depending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user.

The vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow.

Interaction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.

We encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise.

### Patches

The security issue was identified after the integration of a bug-fix commit 68ac4ca into the previously released scs-library-client 1.3.4. This commit fixes the security issue in the 1.3 series.

scs-library-client 1.4.2 contains a fix for the same vulnerability in the 1.4 series, as commit eebd7ca.

### Workarounds

There is no workaround available at this time.

As above, access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.

### References

https://cwe.mitre.org/data/definitions/522.html
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23538
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59312
published_at 2026-04-02T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59336
published_at 2026-04-04T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.593
published_at 2026-04-07T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59351
published_at 2026-04-08T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-09T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59383
published_at 2026-04-11T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-12T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59348
published_at 2026-04-13T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.5938
published_at 2026-04-16T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59387
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23538
1
reference_url https://github.com/sylabs/scs-library-client
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sylabs/scs-library-client
2
reference_url https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/
url https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa
3
reference_url https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/
url https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2
4
reference_url https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/
url https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c
5
reference_url https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:59:54Z/
url https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23538
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23538
7
reference_url https://pkg.go.dev/vuln/GO-2023-1497
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2023-1497
fixed_packages
0
url pkg:apk/alpine/apptainer@1.1.6-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/apptainer@1.1.6-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.6-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2022-23538, GHSA-7p8m-22h4-9pj7
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1v9-q2r1-gfcf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/apptainer@1.1.6-r0%3Farch=riscv64&distroversion=v3.21&reponame=community