Lucene search

K

6 matches found

CVE
CVE
added 2020/04/24 8:15 p.m.118 views

CVE-2020-11013

Their is an information disclosure vulnerability in Helm from version 3.1.0 and before version 3.2.0. lookup is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used...

8.5CVSS5.1AI score0.00273EPSS
CVE
CVE
added 2020/09/17 9:15 p.m.79 views

CVE-2020-15184

In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the alias field on a Chart.yaml is not properly sanitized. This could lead to the injection of unwanted information into a chart. This issue has been patched in Helm 3.3.2 and 2.16.11. A possible workaround is to manually review the ...

4CVSS4AI score0.00234EPSS
CVE
CVE
added 2020/09/17 10:15 p.m.79 views

CVE-2020-15187

In Helm before versions 2.16.11 and 3.3.2, a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack.To perform this a...

6.5CVSS4.9AI score0.00327EPSS
CVE
CVE
added 2020/09/17 10:15 p.m.75 views

CVE-2020-15186

In Helm before versions 2.16.11 and 3.3.2 plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to helm --help. This issue ...

4CVSS3.8AI score0.0042EPSS
CVE
CVE
added 2020/06/16 10:15 p.m.75 views

CVE-2020-4053

In Helm greater than or equal to 3.0.0 and less than 3.2.4, a path traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file outside of the intended directory....

8.5CVSS5.2AI score0.00408EPSS
CVE
CVE
added 2020/09/17 10:15 p.m.68 views

CVE-2020-15185

In Helm before versions 2.16.11 and 3.3.2, a Helm repository can contain duplicates of the same chart, with the last one always used. If a repository is compromised, this lowers the level of access that an attacker needs to inject a bad chart into a repository. To perform this attack, an attacker m...

4CVSS3.8AI score0.00348EPSS