logo

CVE-2020-15187 helm.sh/helm

Package

Manager: go
Name: helm.sh/helm
Vulnerable Version: >=2.0.0 <2.16.11

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00327 pctl0.54955

Details

plugin.yaml file allows for duplicate entries in helm ### Impact During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack. To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). ### Patches This issue has been patched in Helm 2.16.11 and Helm 3.3.2. ### Workarounds Make sure to install plugins using a secure connection protocol like SSL.

Metadata

Created: 2021-05-24T16:57:21Z
Modified: 2025-05-29T22:59:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-c52f-pq47-2r9j/GHSA-c52f-pq47-2r9j.json
CWE IDs: ["CWE-694", "CWE-74"]
Alternative ID: GHSA-c52f-pq47-2r9j
Finding: F009
Auto approve: 1