CVE-2024-8037

Source
https://cve.org/CVERecord?id=CVE-2024-8037
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-8037.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-8037
Aliases
Downstream
Related
Published
2024-10-02T11:15:11.690Z
Modified
2026-02-11T13:43:03.938796Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H CVSS Calculator
Summary
[none]
Details

Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJUCONTEXTID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perform actions that are normally reserved to a juju charm.

References

Affected packages

Git / github.com/juju/juju

Affected versions

v2.*
v2.9.48
v2.9.49
v3.*
v3.5.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-8037.json"