Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJU_CONTEXT_ID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perform actions that are normally reserved to a juju charm.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Juju | Canonical | * | 2.9.51 (excluding) |
Juju | Canonical | 3.1.0 (including) | 3.1.10 (excluding) |
Juju | Canonical | 3.2.0 (including) | 3.2.4 (including) |
Juju | Canonical | 3.3.0 (including) | 3.3.7 (excluding) |
Juju | Canonical | 3.4 (including) | 3.4.6 (excluding) |
Juju | Canonical | 3.5.0 (including) | 3.5.4 (excluding) |
Juju | Ubuntu | snap | * |
Juju | Ubuntu | upstream | * |