In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
References
Link | Resource |
---|---|
https://helm.sh/blog/2019-10-30-helm-symlink-security-notice/ | Vendor Advisory |
https://helm.sh/blog/2019-10-30-helm-symlink-security-notice/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://helm.sh/blog/2019-10-30-helm-symlink-security-notice/ - Vendor Advisory |
Information
Published : 2019-11-12 14:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18658
Mitre link : CVE-2019-18658
CVE.ORG link : CVE-2019-18658
JSON object : View
Products Affected
helm
- helm
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')