Skip to content

x/vulndb: potential Go vuln in helm.sh/helm/v3/pkg/plugin: GHSA-m54r-vrmv-hw33 #1407

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue Jan 9, 2023 · 1 comment

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-m54r-vrmv-hw33, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
helm.sh/helm/v3/pkg/plugin 3.3.2 >= 3.0.0, < 3.3.2

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - introduced: 3.0.0
        fixed: 3.3.2
    packages:
      - package: helm.sh/helm/v3/pkg/plugin
  - module: TODO
    versions:
      - introduced: 2.0.0
        fixed: 2.16.11
    packages:
      - package: helm.sh/helm/v3/pkg/plugin
  - module: TODO
    versions:
      - fixed: 2.16.11
    packages:
      - package: helm.sh/helm
  - module: TODO
    versions:
      - introduced: 3.0.0
        fixed: 3.3.2
    packages:
      - package: helm.sh/helm/v3
description: |-
    ### Impact

    Security researchers at Trail of Bits discovered that plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`.

    ### Patches

    This issue has been patched in Helm 3.3.2.

    ### Workarounds

    Do not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range.
cves:
  - CVE-2020-15186
ghsas:
  - GHSA-m54r-vrmv-hw33

@tatianab
Copy link
Contributor

tatianab commented Jan 9, 2023

Duplicate of #856

@tatianab tatianab marked this as a duplicate of #856 Jan 9, 2023
@tatianab tatianab closed this as completed Jan 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants