CVE-2024-8037: Vulnerable juju hook tool abstract UNIX domain socket
(updated )
When combined with an attack of JUJU_CONTEXT_ID
, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket
and perform actions that are normally reserved to a juju charm.
References
- github.com/advisories/GHSA-8v4w-f4r9-7h6x
- github.com/juju/juju
- github.com/juju/juju/blob/725800953aaa29dbeda4f806097bf838e61644dd/worker/uniter/paths.go
- github.com/juju/juju/commit/2f2ec128ef5a8ca81fc86ae79cfcdbab0007c206
- github.com/juju/juju/security/advisories/GHSA-8v4w-f4r9-7h6x
- github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4
- nvd.nist.gov/vuln/detail/CVE-2024-8037
- pkg.go.dev/vuln/GO-2024-3174
Detect and mitigate CVE-2024-8037 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →