CVE-2023-25165

Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () https://github.com/helm/helm/commit/5abcf74227bfe8e5a3dbf105fe62e7b12deb58d2 - Patch () https://github.com/helm/helm/commit/5abcf74227bfe8e5a3dbf105fe62e7b12deb58d2 - Patch
References () https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8 - Exploit, Vendor Advisory () https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8 - Exploit, Vendor Advisory

Information

Published : 2023-02-08 20:15

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25165

Mitre link : CVE-2023-25165

CVE.ORG link : CVE-2023-25165


JSON object : View

Products Affected

helm

  • helm
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor