VYPR
Moderate severityOSV Advisory· Published Feb 4, 2019· Updated Aug 5, 2024

CVE-2019-1000008

CVE-2019-1000008

Description

All versions of Helm between Helm >=2.0.0 and < 2.12.2 contains a CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The commands helm fetch --untar and helm lint some.tgz that can result when chart archive files are unpacked a file may be unpacked outside of the target directory. This attack appears to be exploitable via a victim must run a helm command on a specially crafted chart archive. This vulnerability appears to have been fixed in 2.12.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Helm <2.12.2 contains a path traversal vulnerability in `helm fetch --untar` and `helm lint some.tgz` allowing file writes outside the target directory.

Vulnerability

All versions of Helm between Helm >=2.0.0 and < 2.12.2 contain a CWE-22 path traversal vulnerability ([1], [3]). The commands helm fetch --untar and helm lint some.tgz unsafely unpack chart archive files without properly sanitizing file names that contain references to parent directories ([3]). This allows a specially crafted chart archive to write files outside the intended target directory ([1]).

Exploitation

The attacker must craft a malicious Helm chart archive with file names containing path traversal sequences (e.g., ../) ([3]). A victim must run either helm fetch --untar on the crafted archive or helm lint some.tgz (which unpacks the archive into a temporary directory) ([1], [3]). No other authentication or network position is required beyond delivering the archive to the victim ([3]).

Impact

A successful exploit allows an attacker to write files to arbitrary locations on the victim's filesystem, potentially overwriting existing files ([1], [3]). This is a client-only vulnerability; no Tiller (server-side) component is affected and Kubernetes clusters are not directly compromised ([3]). The impact is limited to the user's local filesystem integrity and potential for further local privilege escalation if sensitive files are overwritten.

Mitigation

Update to Helm >= 2.12.2, which disallows paths that could store files outside the present working directory ([1], [3]). As a workaround, unpack charts with the appropriate tar command instead of using --untar on helm fetch, and do not run helm lint on .tgz files directly; run it on the already-unpacked directory ([3]).

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
helm.sh/helmGo
>= 2.0.0, < 2.12.22.12.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.