Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://bugs.launchpad.net/juju/+bug/1682411 | issue tracking exploit third party advisory |
https://www.exploit-db.com/exploits/44023/ | exploit |
http://www.securityfocus.com/bid/98737 | vdb entry third party advisory |