Products
Juju
Source
security@ubuntu.com
Tags
CVE-2024-7558 details
Published : Oct. 2, 2024, 11:15 a.m.
Last Modified : Oct. 2, 2024, 11:15 a.m.
Last Modified : Oct. 2, 2024, 11:15 a.m.
Description
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID value. This gives the unprivileged user access to the same information and tools as the Juju charm.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.7 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-1391 | Use of Weak Credentials | The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
8.7
Exploitability Score
2.0
Impact Score
6.0
Base Severity
HIGH
Vector String : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
References
URL | Source |
---|---|
https://github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4 | security@ubuntu.com |
https://www.cve.org/CVERecord?id=CVE-2024-7558 | security@ubuntu.com |
This website uses the NVD API, but is not approved or certified by it.