Vulnerabilities > CVE-2017-9232 - Missing Authorization vulnerability in Canonical Juju
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Juju before 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3 uses a UNIX domain socket without setting appropriate permissions, allowing privilege escalation by users on the system to root.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 39 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Juju-run Agent - Privilege Escalation (Metasploit). CVE-2017-9232. Local exploit for Linux platform. Tags: Metasploit Framework (MSF) |
file | exploits/linux/local/44023.rb |
id | EDB-ID:44023 |
last seen | 2018-02-12 |
modified | 2018-02-12 |
platform | linux |
port | |
published | 2018-02-12 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/44023/ |
title | Juju-run Agent - Privilege Escalation (Metasploit) |
type | local |
Metasploit
description | This module attempts to gain root privileges on Juju agent systems running the juju-run agent utility. Juju agent systems running agent tools prior to version 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3, provide a UNIX domain socket to manage software ("units") without setting appropriate permissions, allowing unprivileged local users to execute arbitrary commands as root. This module has been tested successfully with Juju agent tools versions 1.18.4, 1.25.5 and 1.25.9 on Ubuntu 14.04.1 LTS x86 deployed by Juju 1.18.1-trusty-amd64 and 1.25.6-trusty-amd64 on Ubuntu 14.04.1 LTS x86_64. |
id | MSF:EXPLOIT/LINUX/LOCAL/JUJU_RUN_AGENT_PRIV_ESC |
last seen | 2020-06-08 |
modified | 2019-01-10 |
published | 2018-01-14 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/local/juju_run_agent_priv_esc.rb |
title | Juju-run Agent Privilege Escalation |
Nessus
NASL family | Ubuntu Local Security Checks |
NASL id | UBUNTU_USN-3300-1.NASL |
description | Ryan Beisner discovered juju did not set permissions on a Unix domain socket. A local attacker could use this flaw to gain administrative privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 100509 |
published | 2017-05-30 |
reporter | Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/100509 |
title | Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : juju-core vulnerability (USN-3300-1) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/146341/juju_run_agent_priv_esc.rb.txt |
id | PACKETSTORM:146341 |
last seen | 2018-02-15 |
published | 2018-02-11 |
reporter | Brendan Coles |
source | https://packetstormsecurity.com/files/146341/Juju-run-Agent-Privilege-Escalation.html |
title | Juju-run Agent Privilege Escalation |