Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.
Metrics
Affected Vendors & Products
References
History
Sun, 08 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:acm:2.4::el8 |
Mon, 19 Aug 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T23:25:31.090Z
Reserved: 2021-05-12T00:00:00
Link: CVE-2021-32690

No data.

Status : Modified
Published: 2021-06-16T22:15:07.737
Modified: 2024-11-21T06:07:32.377
Link: CVE-2021-32690
