Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-8037", "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "state": "PUBLISHED", "assignerShortName": "canonical", "dateReserved": "2024-08-21T00:45:34.399Z", "datePublished": "2024-10-02T10:12:32.318Z", "dateUpdated": "2024-11-01T15:31:40.233Z"}, "containers": {"cna": {"affected": [{"packageName": "juju", "product": "Juju", "vendor": "Canonical Ltd.", "repo": "https://github.com/juju/juju", "platforms": ["Linux"], "versions": [{"status": "affected", "version": "3.5", "lessThan": "3.5.4", "versionType": "semver"}, {"status": "affected", "version": "3.4", "lessThan": "3.4.6", "versionType": "semver"}, {"status": "affected", "version": "3.3", "lessThan": "3.3.7", "versionType": "semver"}, {"status": "affected", "version": "3.1", "lessThan": "3.1.10", "versionType": "semver"}, {"status": "affected", "version": "2.9", "lessThan": "2.9.51", "versionType": "semver"}]}], "descriptions": [{"lang": "en", "value": "Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJU_CONTEXT_ID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perform actions that are normally reserved to a juju charm."}], "references": [{"tags": ["issue-tracking"], "url": "https://github.com/juju/juju/security/advisories/GHSA-8v4w-f4r9-7h6x"}, {"tags": ["issue-tracking"], "url": "https://www.cve.org/CVERecord?id=CVE-2024-8037"}], "credits": [{"lang": "en", "type": "finder", "value": "Pedro Guimaraes"}, {"lang": "en", "value": "Harry Pidcock", "type": "remediation developer"}, {"lang": "en", "value": "Mark Esler", "type": "coordinator"}], "metrics": [{"format": "CVSS", "cvssV3_1": {"version": "3.1", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM"}}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2024-10-02T10:12:32.318Z"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-276", "lang": "en", "description": "CWE-276 Incorrect Default Permissions"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-02T13:56:28.477251Z", "id": "CVE-2024-8037", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-01T15:31:40.233Z"}}]}}