{"id":"GHSA-p5pc-m4q7-7qm9","summary":"Helm Unsafe Link Following","details":"In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as `/etc/passwd`, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.","aliases":["CVE-2019-18658","GO-2023-1938"],"modified":"2024-08-20T20:58:38.061127Z","published":"2022-05-24T22:01:14Z","database_specific":{"cwe_ids":["CWE-59"],"nvd_published_at":"2019-11-12T14:15:00Z","github_reviewed":true,"github_reviewed_at":"2023-07-17T23:57:06Z","severity":"CRITICAL"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18658"},{"type":"PACKAGE","url":"https://github.com/helm/helm"},{"type":"WEB","url":"https://helm.sh/blog/2019-10-30-helm-symlink-security-notice"}],"affected":[{"package":{"name":"helm.sh/helm","ecosystem":"Go","purl":"pkg:golang/helm.sh/helm"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2.0.0"},{"fixed":"2.15.2"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-p5pc-m4q7-7qm9/GHSA-p5pc-m4q7-7qm9.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}