First published: Wed Feb 08 2023(Updated: )
A flaw was found in the helm package. The 'getHostByName' is a Helm template function introduced in Helm v3 and can accept a hostname and return an IP address for that hostname. To get the IP address, the function performs a DNS lookup. The DNS lookup happens when used with 'helm install|upgrade|template' or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to look up the IP address. For example, a malicious chart could inject getHostByName into a chart to disclose values to a malicious DNS server.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Helm Helm | >=3.0.0<3.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25165 is a vulnerability found in the helm package that allows remote attackers to perform DNS lookups.
The severity level of CVE-2023-25165 is medium, with a severity value of 4.
The getHostByName function in the helm package accepts a hostname and performs a DNS lookup to return the corresponding IP address.
Helm version 3.11.1 is affected by CVE-2023-25165.
To fix the vulnerability CVE-2023-25165, update Helm to version 3.11.1.