Insufficient verification of data authenticity in Helm - CVE-2020-15185

 

Insufficient verification of data authenticity in Helm - CVE-2020-15185

Published: September 18, 2020 / Updated: April 9, 2026


Vulnerability identifier: #VU47090
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-15185
CWE-ID: CWE-345
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Helm
Software vendor:
The Helm Project

Description

The vulnerability allows a remote user to inject a malicious chart entry into a repository.

The vulnerability exists due to improper integrity control in the repository index file when processing duplicate c hart entries. A remote user can modify the index file so that a malicious duplicate chart entry is used to inject a malicious chart entry into a repository.

Exploitation requires write access to the index file and may occur during a machine-in-the-middle attack on a non-SSL connection.


Remediation

Install update from vendor's website.

External links