Логотип exploitDog
bind:CVE-2020-15229
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15229

Количество 6

Количество 6

ubuntu логотип

CVE-2020-15229

больше 5 лет назад

Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use ...

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2020-15229

больше 5 лет назад

Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Sin

CVSS3: 8.2
EPSS: Низкий
debian логотип

CVE-2020-15229

больше 5 лет назад

Singularity (an open source container platform) from version 3.1.1 thr ...

CVSS3: 8.2
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1770-1

больше 5 лет назад

Security update for singularity

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1769-1

больше 5 лет назад

Security update for singularity

EPSS: Низкий
github логотип

GHSA-7gcp-w6ww-2xv9

больше 4 лет назад

Path traversal and files overwrite with unsquashfs in singularity

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-15229

Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use ...

CVSS3: 8.2
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-15229

Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Sin

CVSS3: 8.2
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-15229

Singularity (an open source container platform) from version 3.1.1 thr ...

CVSS3: 8.2
1%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1770-1

Security update for singularity

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1769-1

Security update for singularity

1%
Низкий
больше 5 лет назад
github логотип
GHSA-7gcp-w6ww-2xv9

Path traversal and files overwrite with unsquashfs in singularity

CVSS3: 8.2
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу