Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-32690

Опубликовано: 16 июн. 2021
Источник: redhat
CVSS3: 6.8

Описание

Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the index.yaml file for that repository, one may look for another domain in the urls list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.

A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.

Отчет

Red Hat Advanced Cluster Management for Kubernetes: In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all. OpenShift Developer Tools and Services: The OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServiceshelmWill not fix
OpenShift Service Mesh 1servicemeshOut of support scope
OpenShift Service Mesh 1servicemesh-operatorOut of support scope
OpenShift Service Mesh 2.0servicemeshNot affected
OpenShift Service Mesh 2.0servicemesh-operatorNot affected
Red Hat Advanced Cluster Management for Kubernetes 2cert-policy-controllerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2config-policy-controllerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2endpoint-component-operatorNot affected
Red Hat Advanced Cluster Management for Kubernetes 2endpoint-operatorNot affected
Red Hat Advanced Cluster Management for Kubernetes 2governance-policy-propagatorNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1978144helm: information disclosure vulnerability

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
nvd
больше 4 лет назад

Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.

CVSS3: 8.6
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.8
debian
больше 4 лет назад

Helm is a tool for managing Charts (packages of pre-configured Kuberne ...

github
больше 4 лет назад

Helm passes repository credentials to alternate domain

6.8 Medium

CVSS3