Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-32635

Опубликовано: 28 мая 2021
Источник: nvd
CVSS3: 6.3
CVSS2: 6.8
EPSS Низкий

Описание

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, singularity action commands (run/shell/exec) specifying a container using a library:// URI will always attempt to retrieve the container from the default remote endpoint (cloud.sylabs.io) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (run/shell/exec) against library:// URIs are affected. Other commands such as pull / push respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed w

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:sylabs:singularity:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:sylabs:singularity:3.7.3:*:*:*:*:*:*:*

EPSS

Процентиль: 70%
0.00632
Низкий

6.3 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-20
NVD-CWE-Other

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 4 лет назад

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signe...

CVSS3: 6.3
debian
больше 4 лет назад

Singularity is an open source container platform. In verions 3.7.2 and ...

CVSS3: 6.3
github
больше 4 лет назад

Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint

CVSS3: 6.3
fstec
больше 4 лет назад

Уязвимость контейнерной платформы Singularity, связанная с непринятием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 70%
0.00632
Низкий

6.3 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-20
NVD-CWE-Other