Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2020-11013
April 24, 2020
Their is an information disclosure vulnerability in Helm from version 3.1.0 and before version 3.2.0. "lookup" is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as part of the process to render templates. The documented behavior of "helm template" states that it does not attach to a remote cluster. However, a the recently added "lookup" template function circumvents this restriction and connects to the cluster even during "helm template" and "helm install|update|delete|rollback --dry-run". The user is not notified of this behavior. Running "helm template" should not make calls to a cluster. This is different from "install", which is presumed to have access to a cluster in order to load resources into Kubernetes. Helm 2 is unaffected by this vulnerability. A malicious chart author could inject a "lookup" into a chart that, when rendered through "helm template", performs unannounced lookups against the cluster a user's "KUBECONFIG" file points to. This information can then be disclosed via the output of "helm template". This issue has been fixed in Helm 3.2.0
Affected Packages
helm.sh/helm/v3 (GO):
Affected version(s) >=v3.0.0 <v3.1.3
Fix Suggestion:
Update to version v3.1.3
Additional Notes
The description of this vulnerability differs from MITRE.
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE
CVSS v2
Base Score:
4
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
EPSS
Base Score:
0.21