In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4688 In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
Github GHSA Github GHSA GHSA-p5pc-m4q7-7qm9 Helm Unsafe Link Following
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:54:14.598Z

Reserved: 2019-10-31T00:00:00

Link: CVE-2019-18658

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-12T14:15:11.343

Modified: 2024-11-21T04:33:28.240

Link: CVE-2019-18658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses