Логотип exploitDog
bind:"CVE-2025-53547"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-53547"

Количество 10

Количество 10

redhat логотип

CVE-2025-53547

6 месяцев назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
EPSS: Низкий
nvd логотип

CVE-2025-53547

6 месяцев назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
EPSS: Низкий
msrc логотип

CVE-2025-53547

6 месяцев назад

Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution

CVSS3: 8.5
EPSS: Низкий
debian логотип

CVE-2025-53547

6 месяцев назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, ...

CVSS3: 8.5
EPSS: Низкий
github логотип

GHSA-557j-xg8c-q2mm

6 месяцев назад

Helm vulnerable to Code Injection through malicious chart.yaml content

CVSS3: 8.5
EPSS: Низкий
fstec логотип

BDU:2025-10843

6 месяцев назад

Уязвимость пакетного менеджера для Kubernetes Helm, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.5
EPSS: Низкий
redos логотип

ROS-20250822-15

4 месяца назад

Уязвимость helm

CVSS3: 8.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4190-1

около 1 месяца назад

Security update for helm

EPSS: Низкий
redos логотип

ROS-20250828-06

4 месяца назад

Множественные уязвимости portainer-ce

CVSS3: 8.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20117-1

около 1 месяца назад

Security update for trivy

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-53547

Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution

CVSS3: 8.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, ...

CVSS3: 8.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-557j-xg8c-q2mm

Helm vulnerable to Code Injection through malicious chart.yaml content

CVSS3: 8.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-10843

Уязвимость пакетного менеджера для Kubernetes Helm, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.5
0%
Низкий
6 месяцев назад
redos логотип
ROS-20250822-15

Уязвимость helm

CVSS3: 8.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4190-1

Security update for helm

около 1 месяца назад
redos логотип
ROS-20250828-06

Множественные уязвимости portainer-ce

CVSS3: 8.5
4 месяца назад
suse-cvrf логотип
openSUSE-SU-2025:20117-1

Security update for trivy

около 1 месяца назад

Уязвимостей на страницу