Логотип exploitDog
bind:CVE-2021-32635
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-32635

Количество 5

Количество 5

ubuntu логотип

CVE-2021-32635

больше 4 лет назад

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signe...

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2021-32635

больше 4 лет назад

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed w

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2021-32635

больше 4 лет назад

Singularity is an open source container platform. In verions 3.7.2 and ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-5mv9-q7fq-9394

больше 4 лет назад

Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2021-04872

больше 4 лет назад

Уязвимость контейнерной платформы Singularity, связанная с непринятием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-32635

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signe...

CVSS3: 6.3
1%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-32635

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed w

CVSS3: 6.3
1%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-32635

Singularity is an open source container platform. In verions 3.7.2 and ...

CVSS3: 6.3
1%
Низкий
больше 4 лет назад
github логотип
GHSA-5mv9-q7fq-9394

Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint

CVSS3: 6.3
1%
Низкий
больше 4 лет назад
fstec логотип
BDU:2021-04872

Уязвимость контейнерной платформы Singularity, связанная с непринятием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.3
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу