cve/2021/CVE-2021-32690.md
2025-09-29 21:09:30 +02:00

18 lines
1.4 KiB
Markdown

### [CVE-2021-32690](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32690)
![](https://img.shields.io/static/v1?label=Product&message=helm&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%203.6.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brightgreen)
### Description
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/leoambrus/artefactswithoutCVEonGitHubAdvisoryDatabase