First published: Tue Jun 16 2020(Updated: )
In Helm greater than or equal to 3.0.0 and less than 3.2.4, a path traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file outside of the intended directory. This has been fixed in 3.2.4.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/helm.sh/helm/v3 | >=3.0.0<3.2.4 | 3.2.4 |
Helm Helm | >=3.0.0<3.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4053 is an information disclosure vulnerability in Helm 3.0.0-3.2.3 that allows for a traversal attack when installing Helm plugins from a tar archive over HTTP.
CVE-2020-4053 allows a malicious plugin author to inject a relative path into a plugin archive, potentially leading to a path traversal attack.
CVE-2020-4053 has a severity level of high, with a CVSS score of 6.8.
Helm versions greater than or equal to 3.0.0 and less than 3.2.4 are affected by CVE-2020-4053.
To fix CVE-2020-4053, update Helm to version 3.2.4 or later.