{"id":"CVE-2020-15187","details":"In Helm before versions 2.16.11 and 3.3.2, a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack.\nTo perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). This issue has been patched in Helm 2.16.11 and Helm 3.3.2.\nAs a possible workaround make sure to install plugins using a secure connection protocol like SSL.","aliases":["BIT-helm-2020-15187","GHSA-c52f-pq47-2r9j"],"modified":"2026-04-10T04:22:49.368800Z","published":"2020-09-17T22:15:12.647Z","related":["GHSA-c52f-pq47-2r9j","SUSE-SU-2020:3760-1"],"references":[{"type":"ADVISORY","url":"https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j"},{"type":"FIX","url":"https://github.com/helm/helm/commit/f2ede29480b507b7d8bb152dd8b6b86248b00658"},{"type":"FIX","url":"https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946"},{"type":"FIX","url":"https://github.com/helm/helm/commit/ac7c07c37d87e09797f714fb57aa5e9cb99d9450"},{"type":"FIX","url":"https://github.com/helm/helm/commit/b0296c0522e837d65f944beefa3fb64fd08ac304"},{"type":"FIX","url":"https://github.com/helm/helm/commit/c8d6b01d72c9604e43ee70d0d78fadd54c2d8499"},{"type":"FIX","url":"https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/helm/helm","events":[{"introduced":"51bdad42756dfaf3234f53ef3d3cb6bcd94144c2"},{"fixed":"73b28bab84490d18ab1b71489a574ee18e229eea"},{"introduced":"e29ce2a54e96cd02ccfce88bee4f58bb6e2a28b6"},{"fixed":"e5077257b6ca106d1f65652b4ca994736d221ab1"},{"fixed":"6aab63765f99050b115f0aec3d6350c85e8da946"},{"fixed":"ac7c07c37d87e09797f714fb57aa5e9cb99d9450"},{"fixed":"b0296c0522e837d65f944beefa3fb64fd08ac304"},{"fixed":"c8d6b01d72c9604e43ee70d0d78fadd54c2d8499"},{"fixed":"d9ef5ce8bad512e325390c0011be1244b8380e4b"},{"fixed":"f2ede29480b507b7d8bb152dd8b6b86248b00658"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.16.11"},{"introduced":"3.0.0"},{"fixed":"3.3.2"}]}}],"versions":["v2.0.0","v2.1.0","v2.10.0-rc.1","v2.10.0-rc.2","v2.16.10","v2.16.7","v2.16.8","v2.16.9","v2.2.0","v2.3.0","v2.4.0","v2.5.0","v2.6.0","v2.7.0","v2.7.0-rc1","v2.8.0-rc.1","v3.0.0-alpha.1","v3.0.0-alpha.2","v3.0.0-beta.1","v3.0.0-beta.2","v3.0.0-beta.3","v3.0.0-beta.4","v3.0.0-beta.5","v3.3.0","v3.3.0-rc.1","v3.3.0-rc.2","v3.3.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15187.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}]}