Miggo Logo

CVE-2021-32690: Helm passes repository credentials to alternate domain

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.31821%
Published
6/23/2021
Updated
5/20/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
helm.sh/helm/v3go< 3.6.13.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from credential handling functions that didn't validate() domain matching between repository URL and chart URLs. Key functions identified through: 1) HTTPGetter.get adding auth headers without domain checks (fixed via URL parsing), 2) LocateChart/FindChartInAuthAndTLSRepoURL resolving charts without credential scoping (patched with scheme/host/port checks), 3) Manager.findChartURL passing credentials cross-domain (patched with passCredentialsAll parameter). The commit diffs show these functions were modified to add domain validation and credential scoping logic.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W*il* workin* on t** **lm sour**, * **lm *or* m*int*in*r *is*ov*r** * situ*tion w**r* t** us*rn*m* *n* p*sswor* *r***nti*ls *sso*i*t** wit* * **lm r*pository *oul* ** p*ss** on to *not**r *om*in r***r*n*** *y t**t **lm r*pository. ### Imp**t T** `i

Reasoning

T** vuln*r**ility st*mm** *rom *r***nti*l **n*lin* *un*tions t**t *i*n't `v*li**t*()` *om*in m*t**in* **tw**n r*pository URL *n* ***rt URLs. K*y *un*tions i**nti*i** t*rou**: *) `*TTP**tt*r.**t` ***in* *ut* *****rs wit*out *om*in ****ks (*ix** vi* UR