CVE-2017-9232

CRITICAL

Juju <2.1.3 - Privilege Escalation

Title source: llm

Description

Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44023
metasploit WORKING POC EXCELLENT
by Ryan Beisner, David Ames (@thedac), bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/juju_run_agent_priv_esc.rb

Scores

CVSS v3 9.8
EPSS 0.8161
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-862
Status published
Products (9)
canonical/juju 2.0.0 (24 CPE variants)
canonical/juju 2.0.1
canonical/juju 2.0.2
canonical/juju 2.0.3
canonical/juju 2.1.0 (8 CPE variants)
canonical/juju 2.1.1
canonical/juju 2.1.2
canonical/juju < 1.25.12
juju/juju 0 - 0.0.0-20170524231039-0417178a3c28Go
Published May 28, 2017
Tracked Since Feb 18, 2026