CVE-2026-32694
- EPSS 0.03%
- Veröffentlicht 18.03.2026 12:55:42
- Zuletzt bearbeitet 19.03.2026 15:05:34
In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request ...
CVE-2026-32693
- EPSS 0.05%
- Veröffentlicht 18.03.2026 12:47:02
- Zuletzt bearbeitet 19.03.2026 15:17:00
In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs ...
CVE-2026-32692
- EPSS 0.03%
- Veröffentlicht 18.03.2026 12:35:29
- Zuletzt bearbeitet 19.03.2026 15:23:26
An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker ...
CVE-2026-32691
- EPSS 0.01%
- Veröffentlicht 18.03.2026 12:28:11
- Zuletzt bearbeitet 19.03.2026 15:34:39
A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revisi...
CVE-2026-1237
- EPSS 0.01%
- Veröffentlicht 28.01.2026 15:01:46
- Zuletzt bearbeitet 29.01.2026 16:31:00
Vulnerable cross-model authorization in juju. If a charm's cross-model permissions are revoked or expire, a malicious user who is able to update database records can mint an invalid macaroon that is incorrectly validated by the juju controller, enabl...
CVE-2025-0928
- EPSS 0.72%
- Veröffentlicht 08.07.2025 17:20:04
- Zuletzt bearbeitet 08.01.2026 11:51:10
In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled ...
CVE-2025-53513
- EPSS 0.1%
- Veröffentlicht 08.07.2025 16:57:06
- Zuletzt bearbeitet 08.01.2026 11:51:23
The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gai...
CVE-2025-53512
- EPSS 0.06%
- Veröffentlicht 08.07.2025 16:47:44
- Zuletzt bearbeitet 08.01.2026 11:51:20
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
CVE-2023-0092
- EPSS 0.5%
- Veröffentlicht 31.01.2025 02:15:28
- Zuletzt bearbeitet 26.08.2025 17:48:55
An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.
- EPSS 0.2%
- Veröffentlicht 02.10.2024 11:15:11
- Zuletzt bearbeitet 26.08.2025 17:42:37
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT...