CVE-2021-32690 - log back

CVE-2021-32690 edited at 17 Jun 2021 07:59:24
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Information disclosure
Description
+ In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository.
+
+ The index.yaml within a Helm chart repository contains a reference where to get the chart archive for each version of a chart. The reference can be relative to the index.yaml file or a URL to location. The URL can point to any domain and this is a feature leveraged by Helm users. For example, an index.yaml file can be hosted on GitHub pages while the chart archives are hosted as GitHub releases. These are on different domain names and the index.yaml file points to the other domain.
+
+ When a username and password were associated with a Helm repository the username and password were also passed on to other domains referenced in the index.yaml file. This occurred when Helm went to retrieve a specific chart archive on the other domain.
References
+ https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf
+ https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f
Notes
+ If you use a username and password for a Helm repository you can audit the Helm repository in order to check for another domain being used that could have received the credentials. In the index.yaml file for that repository, look for another domain in the urls list for the chart versions. If there is another domain found and that chart version was pulled or installed the credentials would have been passed on.
CVE-2021-32690 created at 17 Jun 2021 07:55:29