{"id":"CVE-2021-32635","details":"Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed with specific secure keys.","aliases":["GHSA-5mv9-q7fq-9394"],"modified":"2026-05-16T04:03:05.504010341Z","published":"2021-05-28T21:15:09.020Z","related":["openSUSE-SU-2024:11384-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"sylabs:singularity","cpes":["cpe:2.3:a:sylabs:singularity:3.7.2:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"3.7.2"}]}]},"references":[{"type":"ADVISORY","url":"https://github.com/sylabs/singularity/releases/tag/v3.7.4"},{"type":"ADVISORY","url":"https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-50"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}