{"api_version":"1","generated_at":"2026-04-23T06:18:58+00:00","cve":"CVE-2020-13845","urls":{"html":"https://cve.report/CVE-2020-13845","api":"https://cve.report/api/cve/CVE-2020-13845.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-13845","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-13845"},"summary":{"title":"CVE-2020-13845","description":"Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-07-14 18:15:00","updated_at":"2023-01-20 20:09:00"},"problem_types":["CWE-347","CWE-354"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html","name":"openSUSE-SU-2020:1100","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1100-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html","name":"openSUSE-SU-2020:1011","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1011-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://medium.com/sylabs","name":"https://medium.com/sylabs","refsource":"MISC","tags":["Third Party Advisory"],"title":"Sylabs – Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html","name":"openSUSE-SU-2020:1037","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1037-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c","name":"https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c","refsource":"MISC","tags":["Third Party Advisory"],"title":"Execution Control List (ECL) Is Insecure · Advisory · hpcng/singularity · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-13845","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13845","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"13845","vulnerable":"1","versionEndIncluding":"3.5.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sylabs","cpe5":"singularity","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-13845","qid":"506241","title":"Alpine Linux Security Update for singularity"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-13845","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://medium.com/sylabs","refsource":"MISC","name":"https://medium.com/sylabs"},{"refsource":"MISC","name":"https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c","url":"https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1011","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1037","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1100","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html"}]}},"nvd":{"publishedDate":"2020-07-14 18:15:00","lastModifiedDate":"2023-01-20 20:09:00","problem_types":["CWE-347","CWE-354"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.5.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"13845","Ordinal":"175071","Title":"CVE-2020-13845","CVE":"CVE-2020-13845","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"13845","Ordinal":"1","NoteData":"Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"13845","Ordinal":"2","NoteData":"2020-07-14","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"13845","Ordinal":"3","NoteData":"2020-09-18","Type":"Other","Title":"Modified"}]}}}