Filtered by vendor Canonical Subscriptions
Filtered by product Juju Subscriptions
Total 10 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-0928 1 Canonical 1 Juju 2025-08-26 8.8 High
In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.
CVE-2025-53513 1 Canonical 1 Juju 2025-08-26 8.8 High
The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.
CVE-2025-53512 1 Canonical 1 Juju 2025-08-26 6.5 Medium
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
CVE-2023-0092 1 Canonical 1 Juju 2025-08-26 4.9 Medium
An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.
CVE-2024-8037 1 Canonical 1 Juju 2025-08-26 6.5 Medium
Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJU_CONTEXT_ID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perform actions that are normally reserved to a juju charm.
CVE-2024-8038 1 Canonical 1 Juju 2025-08-26 7.9 High
Vulnerable juju introspection abstract UNIX domain socket. An abstract UNIX domain socket responsible for introspection is available without authentication locally to network namespace users. This enables denial of service attacks.
CVE-2024-7558 1 Canonical 1 Juju 2025-08-26 8.7 High
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID value. This gives the unprivileged user access to the same information and tools as the Juju charm.
CVE-2017-9232 1 Canonical 1 Juju 2025-04-20 N/A
Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
CVE-2024-6984 1 Canonical 1 Juju 2024-11-21 8.8 High
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm.
CVE-2015-1316 1 Canonical 1 Juju 2024-11-21 N/A
Juju Core's Joyent provider before version 1.25.5 uploads the user's private ssh key.