Exposure of Sensitive System Information Due to Uncleared Debug Information The advisory has been revoked - it doesn't affect any version of package helm.sh/helm/v3/cmd/helm  (opens in a new tab)


Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-HELMSHHELMV3CMDHELM-6368549
  • published5 Mar 2024
  • disclosed3 Mar 2024
  • creditAndrea Cosentino

Introduced: 3 Mar 2024

CVE-2019-25210  (opens in a new tab)
CWE-1258  (opens in a new tab)

How to fix?

There is no fixed version for helm.sh/helm/v3/cmd/helm.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Exposure of Sensitive System Information Due to Uncleared Debug Information when using the --dry-run flag, which outputs debug information. A user can acccess secret values in this output after issuing a command with --dry-run.

Note: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons.