Логотип exploitDog
bind:"CVE-2025-53547"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-53547"

Количество 8

Количество 8

redhat логотип

CVE-2025-53547

4 месяца назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
EPSS: Низкий
nvd логотип

CVE-2025-53547

4 месяца назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
EPSS: Низкий
msrc логотип

CVE-2025-53547

4 месяца назад

Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution

CVSS3: 8.5
EPSS: Низкий
debian логотип

CVE-2025-53547

4 месяца назад

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, ...

CVSS3: 8.5
EPSS: Низкий
redos логотип

ROS-20250822-15

3 месяца назад

Уязвимость helm

CVSS3: 8.5
EPSS: Низкий
github логотип

GHSA-557j-xg8c-q2mm

4 месяца назад

Helm vulnerable to Code Injection through malicious chart.yaml content

CVSS3: 8.5
EPSS: Низкий
fstec логотип

BDU:2025-10843

4 месяца назад

Уязвимость пакетного менеджера для Kubernetes Helm, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.5
EPSS: Низкий
redos логотип

ROS-20250828-06

2 месяца назад

Множественные уязвимости portainer-ce

CVSS3: 8.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

CVSS3: 8.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-53547

Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution

CVSS3: 8.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-53547

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, ...

CVSS3: 8.5
0%
Низкий
4 месяца назад
redos логотип
ROS-20250822-15

Уязвимость helm

CVSS3: 8.5
0%
Низкий
3 месяца назад
github логотип
GHSA-557j-xg8c-q2mm

Helm vulnerable to Code Injection through malicious chart.yaml content

CVSS3: 8.5
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-10843

Уязвимость пакетного менеджера для Kubernetes Helm, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.5
0%
Низкий
4 месяца назад
redos логотип
ROS-20250828-06

Множественные уязвимости portainer-ce

CVSS3: 8.5
2 месяца назад

Уязвимостей на страницу