Lucene search

K
archlinuxArchLinuxASA-202106-52
HistoryJun 22, 2021 - 12:00 a.m.

[ASA-202106-52] helm: information disclosure

2021-06-2200:00:00
security.archlinux.org
172

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

50.4%

Arch Linux Security Advisory ASA-202106-52

Severity: Medium
Date : 2021-06-22
CVE-ID : CVE-2021-32690
Package : helm
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-2078

Summary

The package helm before version 3.6.1-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 3.6.1-1.

pacman -Syu โ€œhelm>=3.6.1-1โ€

The problem has been fixed upstream in version 3.6.1.

Workaround

None.

Description

In versions of helm prior to 3.6.1, a vulnerability exists where the
username and password credentials associated with a Helm repository
could be passed on to another domain referenced by that Helm
repository.

The index.yaml within a Helm chart repository contains a reference
where to get the chart archive for each version of a chart. The
reference can be relative to the index.yaml file or a URL to location.
The URL can point to any domain and this is a feature leveraged by Helm
users. For example, an index.yaml file can be hosted on GitHub pages
while the chart archives are hosted as GitHub releases. These are on
different domain names and the index.yaml file points to the other
domain.

When a username and password were associated with a Helm repository the
username and password were also passed on to other domains referenced
in the index.yaml file. This occurred when Helm went to retrieve a
specific chart archive on the other domain.

Impact

Username and password credentials associated with a Helm repository
could be passed on to another domain referenced by that Helm
repository.

References

https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf
https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f
https://security.archlinux.org/CVE-2021-32690

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyhelm<ย 3.6.1-1UNKNOWN

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

50.4%