You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- introduced: 3.0.0
fixed: 3.3.2
packages:
- package: helm.sh/helm/v3/pkg/plugin
- module: TODO
versions:
- fixed: 2.16.11
packages:
- package: helm.sh/helm/v3/pkg/plugin
- module: TODO
versions:
- fixed: 2.16.11
packages:
- package: helm.sh/helm
- module: TODO
versions:
- introduced: 3.0.0
fixed: 3.3.2
packages:
- package: helm.sh/helm/v3
description: |-
### Impact
During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack.
To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection).
### Patches
This issue has been patched in Helm 2.16.11 and Helm 3.3.2.
### Workarounds
Make sure to install plugins using a secure connection protocol like SSL.
cves:
- CVE-2020-15187
ghsas:
- GHSA-c52f-pq47-2r9j
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-c52f-pq47-2r9j, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: