Arbitrary file reading vulnerability
Bug #1999622 reported by
yhy
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Canonical Juju |
Fix Released
|
Critical
|
Harry Pidcock |
Bug Description
When I learned codeql, I found that there was a potential loophole in juju. When the authentication passed, I downloaded the backup file. I could control the id value to any file location, and then download the file through download().
The version affected by the vulnerability is the latest version 3.0 and below(juju<=latest version)
Please see the attachment for details.
CVE References
Changed in juju: | |
status: | In Progress → Fix Committed |
Changed in juju: | |
status: | Fix Committed → Fix Released |
information type: | Private Security → Public Security |
To post a comment you must log in.
Thank you for raising this issue.