CVE-2020-15187
Summary
| CVE | CVE-2020-15187 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-09-17 22:15:00 UTC |
| Updated | 2021-11-18 17:51:00 UTC |
| Description | In Helm before versions 2.16.11 and 3.3.2, a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack. To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). This issue has been patched in Helm 2.16.11 and Helm 3.3.2. As a possible workaround make sure to install plugins using a secure connection protocol like SSL. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugin.yaml file allows for duplicate entries · Advisory · helm/helm · GitHub | CONFIRM | github.com | Third Party Advisory |
| Merge pull request from GHSA-c52f-pq47-2r9j · helm/helm@d9ef5ce · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980048 Go (go) Security Update for helm.sh/helm/v3/pkg/plugin (GHSA-c52f-pq47-2r9j)