Duplicate Advisory: Juju makes Use of Weak Credentials
High severity
GitHub Reviewed
Published
Oct 2, 2024
to the GitHub Advisory Database
•
Updated Oct 2, 2024
Withdrawn
This advisory was withdrawn on Oct 2, 2024
Package
Affected versions
< 0.0.0-20241001032836-2af7bd8e310b
Patched versions
0.0.0-20241001032836-2af7bd8e310b
Description
Published by the National Vulnerability Database
Oct 2, 2024
Published to the GitHub Advisory Database
Oct 2, 2024
Reviewed
Oct 2, 2024
Withdrawn
Oct 2, 2024
Last updated
Oct 2, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mh98-763h-m9v4. This link is maintained to preserve external references.
Original Description
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID value. This gives the unprivileged user access to the same information and tools as the Juju charm.
References