1 results (0.003 seconds)

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. • https://github.com/sylabs/singularity/releases/tag/v3.7.4 https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394 https://security.gentoo.org/glsa/202107-50 • CWE-20: Improper Input Validation CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •