Vulnerability Details CVE-2019-18658
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2019-18658
-
cpe:2.3:a:helm:helm:2.0.0
-
cpe:2.3:a:helm:helm:2.0.1
-
cpe:2.3:a:helm:helm:2.0.2
-
cpe:2.3:a:helm:helm:2.1.0
-
cpe:2.3:a:helm:helm:2.1.1
-
cpe:2.3:a:helm:helm:2.1.2
-
cpe:2.3:a:helm:helm:2.1.3
-
cpe:2.3:a:helm:helm:2.10.0
-
cpe:2.3:a:helm:helm:2.11.0
-
cpe:2.3:a:helm:helm:2.12.0
-
cpe:2.3:a:helm:helm:2.12.1
-
cpe:2.3:a:helm:helm:2.12.2
-
cpe:2.3:a:helm:helm:2.12.3
-
cpe:2.3:a:helm:helm:2.13.0
-
cpe:2.3:a:helm:helm:2.13.1
-
cpe:2.3:a:helm:helm:2.14.0
-
cpe:2.3:a:helm:helm:2.14.1
-
cpe:2.3:a:helm:helm:2.14.2
-
cpe:2.3:a:helm:helm:2.14.3
-
cpe:2.3:a:helm:helm:2.15.0
-
cpe:2.3:a:helm:helm:2.15.1
-
cpe:2.3:a:helm:helm:2.2.0
-
cpe:2.3:a:helm:helm:2.2.1
-
cpe:2.3:a:helm:helm:2.2.2
-
cpe:2.3:a:helm:helm:2.2.3
-
cpe:2.3:a:helm:helm:2.3.0
-
cpe:2.3:a:helm:helm:2.3.1
-
cpe:2.3:a:helm:helm:2.4.0
-
cpe:2.3:a:helm:helm:2.4.1
-
cpe:2.3:a:helm:helm:2.4.2
-
cpe:2.3:a:helm:helm:2.5.0
-
cpe:2.3:a:helm:helm:2.5.1
-
cpe:2.3:a:helm:helm:2.6.0
-
cpe:2.3:a:helm:helm:2.6.1
-
cpe:2.3:a:helm:helm:2.6.2
-
cpe:2.3:a:helm:helm:2.7.0
-
cpe:2.3:a:helm:helm:2.7.1
-
cpe:2.3:a:helm:helm:2.7.2
-
cpe:2.3:a:helm:helm:2.8.0
-
cpe:2.3:a:helm:helm:2.8.1
-
cpe:2.3:a:helm:helm:2.8.2
-
cpe:2.3:a:helm:helm:2.9.0
-
cpe:2.3:a:helm:helm:2.9.1