CVE-2021-21303
Helm vulnerability analysis and mitigation

Overview

In Helm versions 3.0 through 3.5.1, several cases were identified where data loaded from potentially untrusted sources was not properly sanitized. The vulnerability (CVE-2021-21303) was discovered during a routine code audit by Helm core maintainers and was patched in version 3.5.2. The issue affected the handling of SemVer strings in version fields, repository index.yaml files, plugin.yaml files, and Chart.yaml files (GitHub Advisory).

Technical details

The vulnerability stemmed from a change in version parsing behavior where invalid SemVer strings were passed along as-is instead of being rejected. This deviation from proper SemVer2 specification validation created a potential vector for malicious data injection. The issue also extended to inadequate sanitization of fields in repository index files, plugin.yaml, and Chart.yaml files (GitHub Advisory).

Impact

Attackers could potentially send deceptive information to a terminal screen running the helm command, obscure or alter information on the screen, and in some cases send codes that terminals used to execute higher-order logic, such as clearing a terminal screen. The vulnerability affected both end users and those using Helm as a library (GitHub Advisory).

Mitigation and workarounds

The issue was resolved in Helm 3.5.2. Users are strongly recommended to upgrade to this version. For those unable to upgrade immediately, recommended workarounds include avoiding untrusted chart repositories or Helm plugins, manually auditing index.yaml files for suspicious characters or formatting, and scanning plugin.yaml and Charts.yaml files for suspicious content. Note that Helm 2 was not audited for this vulnerability and should be assumed vulnerable (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management