Impact
A cross-model authorization flaw in Juju permits a malicious user who can alter database records to forge macaroons that the controller incorrectly validates even when permissions are revoked or expired. This flaw allows a charm to preserve or re-establish cross-model relations and utilize another charm’s workload without consent, effectively enabling unauthorized access or data manipulation. The weakness falls under the CWE categories related to resource manipulation and implicit deletion, and the CVSS rating of 2.1 indicates it is a low-severity issue, albeit one that can impact confidentiality and integrity of inter-charm interactions.
Affected Systems
This vulnerability affects Canonical’s Juju platform; no specific version numbers are provided, so all current releases prior to a future fix are potentially impacted. No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 2.1 combined with an EPSS of less than 1% suggests a low exploitation probability, and the flaw is not yet catalogued in the KEV registry. The attack likely requires local or privileged database write access to create the forged macaroons, limiting the attack surface. Nonetheless, in environments where charms interact across models, the risk of unauthorized privilege escalation remains a concern.
OpenCVE Enrichment
Github GHSA