Vulnerability Name: | CVE-2020-15184 | ||||||||||||||||||||||||||||
Assigned: | 2020-09-17 | ||||||||||||||||||||||||||||
Published: | 2020-09-17 | ||||||||||||||||||||||||||||
Updated: | 2021-11-18 | ||||||||||||||||||||||||||||
Summary: | In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. This issue has been patched in Helm 3.3.2 and 2.16.11. A possible workaround is to manually review the `dependencies` field of any untrusted chart, verifying that the `alias` field is either not used, or (if used) does not contain newlines or path characters. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 2.7 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-74 | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15184 Source: MISC Type: Patch, Third Party Advisory https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850 Source: CONFIRM Type: Third Party Advisory https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2020-15184 (CCN-188453) | ||||||||||||||||||||||||||||
Assigned: | 2020-09-17 | ||||||||||||||||||||||||||||
Published: | 2020-09-17 | ||||||||||||||||||||||||||||
Updated: | 2020-10-02 | ||||||||||||||||||||||||||||
Summary: | In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. This issue has been patched in Helm 3.3.2 and 2.16.11. A possible workaround is to manually review the `dependencies` field of any untrusted chart, verifying that the `alias` field is either not used, or (if used) does not contain newlines or path characters. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 2.7 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) 2.4 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15184 Source: XF Type: UNKNOWN helm-cve202015184-sec-bypass(188453) Source: MISC Type: Patch, Third Party Advisory https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850 Source: CCN Type: Helm GIT Repository Aliases are never checked Source: CONFIRM Type: Third Party Advisory https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776 Source: CCN Type: IBM Security Bulletin 6417481 (Cloud Private) IBM Cloud Private is vulnerable to Helm vulnerabilities (CVE-2020-15187, CVE-2020-15186, CVE-2020-15185, CVE-2020-15184) Source: CCN Type: IBM Security Bulletin 6452959 (Spectrum Discover) Vulnerabilities in the Python, Docker, and ICP affect IBM Spectrum Discover | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |