Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed with specific secure keys.
References
| Link | Resource |
|---|---|
| https://github.com/sylabs/singularity/releases/tag/v3.7.4 | Third Party Advisory |
| https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394 | Third Party Advisory |
| https://security.gentoo.org/glsa/202107-50 | Third Party Advisory |
| https://github.com/sylabs/singularity/releases/tag/v3.7.4 | Third Party Advisory |
| https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394 | Third Party Advisory |
| https://security.gentoo.org/glsa/202107-50 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/sylabs/singularity/releases/tag/v3.7.4 - Third Party Advisory | |
| References | () https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394 - Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202107-50 - Third Party Advisory |
22 Apr 2022, 16:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jun 2021, 14:22
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sylabs:singularity:3.7.3:*:*:*:*:*:*:* cpe:2.3:a:sylabs:singularity:3.7.2:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 6.3 |
| References | (CONFIRM) https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394 - Third Party Advisory | |
| References | (MISC) https://github.com/sylabs/singularity/releases/tag/v3.7.4 - Third Party Advisory | |
| CWE | NVD-CWE-Other |
07 Jun 2021, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-20 CWE-923 |
|
| References |
|
|
| Summary | Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed with specific secure keys. |
28 May 2021, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-05-28 21:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32635
Mitre link : CVE-2021-32635
CVE.ORG link : CVE-2021-32635
JSON object : View
Products Affected
sylabs
- singularity
CWE
CWE-20
Improper Input Validation
CWE-923Improper Restriction of Communication Channel to Intended Endpoints
NVD-CWE-Other