An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-x5rv-w9pm-8qp8 | Vendor Advisory |
https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556 | Patch |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* | |
First Time |
Canonical
Canonical juju |
|
References | () https://github.com/advisories/GHSA-x5rv-w9pm-8qp8 - Vendor Advisory | |
References | () https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556 - Patch |
07 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
Summary |
|
31 Jan 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-31 02:15
Updated : 2025-08-26 17:48
NVD link : CVE-2023-0092
Mitre link : CVE-2023-0092
CVE.ORG link : CVE-2023-0092
JSON object : View
Products Affected
canonical
- juju
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')