Vulnerability Name:

CVE-2020-15184

Assigned:2020-09-17
Published:2020-09-17
Updated:2021-11-18
Summary:In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. This issue has been patched in Helm 3.3.2 and 2.16.11. A possible workaround is to manually review the `dependencies` field of any untrusted chart, verifying that the `alias` field is either not used, or (if used) does not contain newlines or path characters.
CVSS v3 Severity:2.7 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
2.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-74
References:Source: MITRE
Type: CNA
CVE-2020-15184

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850

Source: CONFIRM
Type: Third Party Advisory
https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776

Vulnerable Configuration:Configuration 1:
  • cpe:/a:helm:helm:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.16.11)
  • OR cpe:/a:helm:helm:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.3.2)

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2020-15184 (CCN-188453)

    Assigned:2020-09-17
    Published:2020-09-17
    Updated:2020-10-02
    Summary:In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized. This could lead to the injection of unwanted information into a chart. This issue has been patched in Helm 3.3.2 and 2.16.11. A possible workaround is to manually review the `dependencies` field of any untrusted chart, verifying that the `alias` field is either not used, or (if used) does not contain newlines or path characters.
    CVSS v3 Severity:2.7 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)
    2.4 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): High
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
    4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): Single_Instance
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): None
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): None
    Vulnerability Type:CWE-20
    Vulnerability Consequences:Bypass Security
    References:Source: MITRE
    Type: CNA
    CVE-2020-15184

    Source: XF
    Type: UNKNOWN
    helm-cve202015184-sec-bypass(188453)

    Source: MISC
    Type: Patch, Third Party Advisory
    https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850

    Source: CCN
    Type: Helm GIT Repository
    Aliases are never checked

    Source: CONFIRM
    Type: Third Party Advisory
    https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776

    Source: CCN
    Type: IBM Security Bulletin 6417481 (Cloud Private)
    IBM Cloud Private is vulnerable to Helm vulnerabilities (CVE-2020-15187, CVE-2020-15186, CVE-2020-15185, CVE-2020-15184)

    Source: CCN
    Type: IBM Security Bulletin 6452959 (Spectrum Discover)
    Vulnerabilities in the Python, Docker, and ICP affect IBM Spectrum Discover

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:helm:helm:2.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:helm:helm:3.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:helm:helm:2.16.10:*:*:*:*:*:*:*
  • OR cpe:/a:helm:helm:3.3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:202015184
    V
    CVE-2020-15184
    2022-08-07
    oval:org.opensuse.security:def:3783
    P
    Security update for the Linux Kernel (Important)
    2022-07-21
    oval:org.opensuse.security:def:90494
    P
    Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package (Moderate)
    2020-12-23
    oval:org.opensuse.security:def:104149
    P
    Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package (Moderate)
    2020-12-23
    oval:org.opensuse.security:def:97459
    P
    Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package (Moderate)
    2020-12-23
    oval:org.opensuse.security:def:64872
    P
    Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package (Moderate)
    2020-12-23
    BACK
    helm helm *
    helm helm *
    helm helm 2.0.0 -
    helm helm 3.0.0 -
    helm helm 2.16.10
    helm helm 3.3.1
    ibm cloud private 3.2.1 cd
    ibm cloud private 3.2.2 cd