Headline
GHSA-6vjm-54vp-mxhx: Juju's unprivileged user running on charm node can leak any secret or relation data accessible to the local charm
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. A potential exploit where a user can run a bash loop attempting to execute hook tools. If running while another hook is executing, we log an error with the context ID, making it possible for the user to then use that ID in a following call successfully. This means an unprivileged user can access anything available via a hook tool such as config, relation data and secrets.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-6vjm-54vp-mxhx
Juju’s unprivileged user running on charm node can leak any secret or relation data accessible to the local charm
High severity GitHub Reviewed Published Aug 5, 2024 in juju/juju • Updated Aug 5, 2024
Package
gomod github.com/juju/juju (Go)
Affected versions
< 2.9.50
>= 3.0.0, < 3.1.9
>= 3.2.0, < 3.3.6
>= 3.4.0, < 3.4.5
>= 3.5.0, < 3.5.3
Patched versions
2.9.50
3.1.9
3.3.6
3.4.5
3.5.3
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. A potential exploit where a user can run a bash loop attempting to execute hook tools. If running while another hook is executing, we log an error with the context ID, making it possible for the user to then use that ID in a following call successfully. This means an unprivileged user can access anything available via a hook tool such as config, relation data and secrets.
References
- GHSA-6vjm-54vp-mxhx
- https://nvd.nist.gov/vuln/detail/CVE-2024-6984
- juju/juju@da92967
Published to the GitHub Advisory Database
Aug 5, 2024