CVE-2021-32635
Summary
| CVE | CVE-2021-32635 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-28 21:15:00 UTC |
| Updated | 2022-04-22 16:19:00 UTC |
| Description | Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed with specific secure keys. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sylabs | Singularity | 3.7.2 | All | All | All |
| Application | Sylabs | Singularity | 3.7.3 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint · Advisory · sylabs/singularity · GitHub | CONFIRM | github.com | |
| Release Singularity 3.7.4 · sylabs/singularity · GitHub | MISC | github.com | |
| Singularity: Remote code execution (GLSA 202107-50) — Gentoo security | GENTOO | security.gentoo.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.