Information Exposure Affecting flux-helm-controller-0.37 package, versions <0.27.0-r7


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-FLUXHELMCONTROLLER037-6241765
  • published11 Feb 2024
  • disclosed8 Feb 2023

Introduced: 8 Feb 2023

CVE-2023-25165  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Chainguard flux-helm-controller-0.37 to version 0.27.0-r7 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream flux-helm-controller-0.37 package and not the flux-helm-controller-0.37 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Helm is a tool that streamlines installing and managing Kubernetes applications.getHostByName is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with helm install|upgrade|template or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject getHostByName into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the getHostByName function is not being used in a template to disclose any information you do not want passed to DNS servers.

CVSS Scores

version 3.1