Skip to content
This repository has been archived by the owner on Dec 21, 2023. It is now read-only.

Supply chain vulnerability in Keptn 0.1.0 to 0.8.2 due to deleted Google Storage bucket by Helm

Moderate
mowies published GHSA-gqw6-r8pm-9853 Apr 25, 2023

Package

docker keptn/helm-service (Docker)

Affected versions

> 0.1.0

Patched versions

0.7.0
docker keptn/installer (Docker)
> 0.2.2
0.7.0
docker keptn/remediation-service (Docker)
> 0.5.0.beta
0.8.3
docker keptn/upgrader (Docker)
0.7.0
no newer versions available

Description

TL;DR

Remediation service container images between versions 0.7.3 to 0.8.2 are not safe to use.
Building container images from Keptn's source code between versions 0.1.0 and 0.8.2 is not safe, although the released container images are safe (except listed above).

Summary

The vulnerability happened due to a deleted Google Storage bucket by the Helm project (kubernetes-helm bucket) that hosted the CLI binaries. The Helm project switched to GitHub releases for their CLI binaries and deleted the storage bucket which made the name (and therefore identical URL) available again for other users to take. This makes components that depend on the Helm CLI vulnerable to RCE at build time since the storage bucket can be taken by any user and during container image build time and the content of the bucket is downloaded into the container image without any integrity (or any other) checks.

Impact

This is a vulnerability that can only be exploited during build time of Dockerfiles from Keptn versions 0.1.0 to 0.8.2.

Patches

The problem will not be patched since the affected versions are over 2 years old and are not built or maintained anymore by any automated system or otherwise.

The problem will be addressed by deleting the affected Docker images and deleting GitHub tags and release branches for the affected Keptn versions to avoid building the vulnerable code. Additionally, disclaimers will be added to the affected GitHub releases.

Workarounds/Mitigations

The vulnerability can be avoided by not building any of the aforementioned container images by oneself and using the released images instead.

Severity

Moderate
4.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

CVE ID

No known CVE

Weaknesses

No CWEs

Credits