Tag
high
advisory
Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification
2 rules 2 TTPs 1 CVEAn authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.
juju
resource-poisoning
privilege-escalation
cloud
2r
2t
1c
critical
advisory
Juju Controller Vulnerable to Unauthorized Database Access Due to Improper TLS Configuration
2 rules 3 TTPsJuju controller versions 3.2.0 up to 3.6.20 and 4.0.5 are vulnerable to unauthorized database access due to improper TLS client/server authentication and certificate verification, allowing an attacker with network access to modify all information, escalate privileges, and open firewall ports.
juju
dqlite
tls
vulnerability
2r
3t