Information Exposure Affecting helm.sh/helm/v3/cmd/helm package, versions >=3.0.0 <3.11.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-HELMSHHELMV3CMDHELM-3317166
  • published9 Feb 2023
  • disclosed8 Feb 2023
  • creditPhilipp Stehle

Introduced: 8 Feb 2023

CVE-2023-25165  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade helm.sh/helm/v3/cmd/helm to version 3.11.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure via the getHostByName template function. This is because information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject getHostByName into a chart in order to disclose values to a malicious DNS server.

Workaround

Prior to using a chart with Helm, users should verify that the getHostByName function is not being used in a template to disclose any information they do not want to be passed to DNS servers.

CVSS Scores

version 3.1