Insufficient verification of data authenticity in Helm - CVE-2020-15185
Published: September 18, 2020 / Updated: April 9, 2026
Helm
The Helm Project
Description
The vulnerability allows a remote user to inject a malicious chart entry into a repository.
The vulnerability exists due to improper integrity control in the repository index file when processing duplicate c hart entries. A remote user can modify the index file so that a malicious duplicate chart entry is used to inject a malicious chart entry into a repository.
Exploitation requires write access to the index file and may occur during a machine-in-the-middle attack on a non-SSL connection.