First published: Thu Sep 17 2020(Updated: )
### Impact During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack. To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). ### Patches This issue has been patched in Helm 2.16.11 and Helm 3.3.2. ### Workarounds Make sure to install plugins using a secure connection protocol like SSL.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/helm.sh/helm | <2.16.11 | 2.16.11 |
go/helm.sh/helm/v3 | >=3.0.0<3.3.2 | 3.3.2 |
Helm Helm | >=2.0.0<2.16.11 | |
Helm Helm | >=3.0.0<3.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-15187.
This vulnerability allows a compromised Helm plugin to have lowered access to modify a plugin's installation.
The severity of CVE-2020-15187 is low.
The affected software versions are Helm 2.16.11 (exact remedy) and Helm 3.0.0 to 3.3.2 (inclusive exclusive).
To fix CVE-2020-15187, update Helm to version 2.16.11 (exact remedy) or version 3.3.2 (inclusive exclusive).