Improper Authentication Affecting github.com/juju/juju/worker/uniter/runner/context package, versions <2.9.51>=3.1.0 <3.1.10>=3.3.0 <3.3.7>=3.4.0 <3.4.6>=3.5.0 <3.5.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMJUJUJUJUWORKERUNITERRUNNERCONTEXT-8161198
  • published3 Oct 2024
  • disclosed2 Oct 2024
  • creditHarry Pidcock

Introduced: 2 Oct 2024

CVE-2024-7558  (opens in a new tab)
CWE-1391  (opens in a new tab)

How to fix?

Upgrade github.com/juju/juju/worker/uniter/runner/context to version 2.9.51, 3.1.10, 3.3.7, 3.4.6, 3.5.4 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authentication via the JUJU_CONTEXT_ID authentication secret. An attacker can gain unauthorized access to information and tools by guessing the predictable JUJU_CONTEXT_ID value when connecting to an abstract domain socket within the same network namespace.

Note: There is no rate limiting on the abstract domain socket, the only limiting factor is time and memory.

CVSS Scores

version 4.0
version 3.1