Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.
References
Link | Resource |
---|---|
https://github.com/helm/helm/releases/tag/v3.6.1 | Third Party Advisory |
https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-06-16T22:10:10
Updated: 2021-06-16T22:10:10
Reserved: 2021-05-12T00:00:00
Link: CVE-2021-32690
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-16T22:15:07.737
Modified: 2022-10-25T15:16:51.123
Link: CVE-2021-32690
JSON object: View
Redhat Information
No data.
CWE