In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution. | |
Title | Arbitrary executable upload via authenticated endpoint | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: canonical
Published: 2025-07-08T17:20:04.608Z
Updated: 2025-07-08T17:36:20.075Z
Reserved: 2025-01-31T10:43:45.458Z
Link: CVE-2025-0928

Updated: 2025-07-08T17:35:34.900Z

Status : Awaiting Analysis
Published: 2025-07-08T18:15:26.767
Modified: 2025-07-10T13:18:53.830
Link: CVE-2025-0928

No data.