CVE-2023-25165Sensitive Information Exposure in Helm V3

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 59.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 8
Latest updateFeb 14

Description

Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

NVDhelm/helm3.0.03.11.1
Gohelm.sh/helm_v33.0.03.11.1+1
CVEListV5helm/helm>= 3.0.0, < 3.11.1

Patches

🔴Vulnerability Details

4
OSV
Information disclosure in helm.sh/helm/v32023-02-14
CVEList
getHostByName Function Information Disclosure2023-02-08
OSV
Helm vulnerable to information disclosure via getHostByName Function2023-02-08
GHSA
Helm vulnerable to information disclosure via getHostByName Function2023-02-08

📋Vendor Advisories

2
Microsoft
getHostByName Function Information Disclosure2023-02-14
Red Hat
helm: getHostByName Function Information Disclosure2023-02-08
CVE-2023-25165 — Sensitive Information Exposure | cvebase