fkie_cve-2020-15186
Vulnerability from fkie_nvd
Published
2020-09-17 22:15
Modified
2024-11-21 05:05
Severity ?
3.4 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Summary
In Helm before versions 2.16.11 and 3.3.2 plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`. This issue has been patched in Helm 3.3.2. A possible workaround is to not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33 | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", matchCriteriaId: "455BCCE5-1D43-4E59-9591-E84B52DAAF0B", versionEndExcluding: "2.16.11", versionStartIncluding: "2.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", matchCriteriaId: "B462D769-3FC0-4079-8B48-863F013662EF", versionEndExcluding: "3.3.2", versionStartIncluding: "3.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Helm before versions 2.16.11 and 3.3.2 plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`. This issue has been patched in Helm 3.3.2. A possible workaround is to not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range.", }, { lang: "es", value: "En Helm versiones anteriores a 2.16.11 y 3.3.2, los nombres de los plugins no son saneados apropiadamente. Como resultado, un autor de plugin malicioso podría usar caracteres en un nombre de plugin que resultaría en un comportamiento inesperado, como duplicar el nombre de otro plugin o falsificar la salida en \"helm --help\". Este problema ha sido corregido en Helm versión 3.3.2. Una posible solución es no instalar plugins de Helm que no son de confianza. Examine el campo \"name\" en el archivo \"plugin.yaml\" en busca de un plugin, buscando caracteres fuera del rango [a-zA-Z0-9 ._-]", }, ], id: "CVE-2020-15186", lastModified: "2024-11-21T05:05:01.987", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.4, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 1.4, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 2.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-17T22:15:12.520", references: [ { source: "security-advisories@github.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-74", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.