CVE-2023-25165 – helm.sh/helm/v3
Package
Manager: go
Name: helm.sh/helm/v3
Vulnerable Version: >=3.0.0 <3.11.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00151 pctl0.36342
Details
Helm vulnerable to information disclosure via getHostByName Function A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function. ### Impact `getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. ### Patches The issue has been fixed in Helm 3.11.1. ### Workarounds Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Philipp Stehle at SAP.
Metadata
Created: 2023-02-08T22:36:51Z
Modified: 2023-02-08T22:36:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-pwcw-6f5g-gxf8/GHSA-pwcw-6f5g-gxf8.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-pwcw-6f5g-gxf8
Finding: F038
Auto approve: 1