Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-6vjm-54vp-mxhx: Juju's unprivileged user running on charm node can leak any secret or relation data accessible to the local charm

An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. A potential exploit where a user can run a bash loop attempting to execute hook tools. If running while another hook is executing, we log an error with the context ID, making it possible for the user to then use that ID in a following call successfully. This means an unprivileged user can access anything available via a hook tool such as config, relation data and secrets.

ghsa
#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-6vjm-54vp-mxhx

Juju’s unprivileged user running on charm node can leak any secret or relation data accessible to the local charm

High severity GitHub Reviewed Published Aug 5, 2024 in juju/juju • Updated Aug 5, 2024

Package

gomod github.com/juju/juju (Go)

Affected versions

< 2.9.50

>= 3.0.0, < 3.1.9

>= 3.2.0, < 3.3.6

>= 3.4.0, < 3.4.5

>= 3.5.0, < 3.5.3

Patched versions

2.9.50

3.1.9

3.3.6

3.4.5

3.5.3

An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. A potential exploit where a user can run a bash loop attempting to execute hook tools. If running while another hook is executing, we log an error with the context ID, making it possible for the user to then use that ID in a following call successfully. This means an unprivileged user can access anything available via a hook tool such as config, relation data and secrets.

References

  • GHSA-6vjm-54vp-mxhx
  • https://nvd.nist.gov/vuln/detail/CVE-2024-6984
  • juju/juju@da92967

Published to the GitHub Advisory Database

Aug 5, 2024

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access