Vulnerability Report: GO-2023-1547
- CVE-2023-25165, GHSA-pwcw-6f5g-gxf8
- Affects: helm.sh/helm/v3
- Published: Feb 14, 2023
- Modified: Dec 14, 2023
An information disclosure vulnerability exists in the getHostByName template function. The function getHostByName is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with "helm install|upgrade|template" or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject getHostByName into a chart in order to disclose values to a malicious DNS server.
For detailed information about this vulnerability, visit https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8.
Affected Packages
-
PathVersionsSymbols
-
before v3.11.1all symbols
-
before v3.11.1
5 affected symbols
-
before v3.11.1
Aliases
References
- https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8
- https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737
- https://vuln.go.dev/ID/GO-2023-1547.json
Credits
- Philipp Stehle of SAP