CVE-2017-9232
CRITICALJuju <2.1.3 - Privilege Escalation
Title source: llmDescription
Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44023
metasploit
WORKING POC
EXCELLENT
by Ryan Beisner, David Ames (@thedac), bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/juju_run_agent_priv_esc.rb
Scores
CVSS v3
9.8
EPSS
0.8161
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-862
Status
published
Products (9)
canonical/juju
2.0.0 (24 CPE variants)
canonical/juju
2.0.1
canonical/juju
2.0.2
canonical/juju
2.0.3
canonical/juju
2.1.0 (8 CPE variants)
canonical/juju
2.1.1
canonical/juju
2.1.2
canonical/juju
< 1.25.12
juju/juju
0 - 0.0.0-20170524231039-0417178a3c28Go
Published
May 28, 2017
Tracked Since
Feb 18, 2026