Juju's unprivileged user running on charm node can leak any secret or relation data accessible to the local charm
Package
Affected versions
< 2.9.50
>= 3.0.0, < 3.1.9
>= 3.2.0, < 3.3.6
>= 3.4.0, < 3.4.5
>= 3.5.0, < 3.5.3
Patched versions
2.9.50
3.1.9
3.3.6
3.4.5
3.5.3
Description
Published to the GitHub Advisory Database
Aug 5, 2024
Reviewed
Aug 5, 2024
Last updated
Aug 7, 2024
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. A potential exploit where a user can run a bash loop attempting to execute hook tools. If running while another hook is executing, we log an error with the context ID, making it possible for the user to then use that ID in a following call successfully. This means an unprivileged user can access anything available via a hook tool such as config, relation data and secrets.
References