Juju's unprivileged user running on charm node can leak any secret or relation data accessible to the local charm in github.com/juju/juju.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: github.com/juju/juju before v2.9.50, from v3.0.0 before v3.1.9, from v3.2.0 before v3.3.6, from v3.4.0 before v3.4.5, from v3.5.0 before v3.5.3.
{ "custom_ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.9.50" }, { "introduced": "3.0.0" }, { "fixed": "3.1.9" }, { "introduced": "3.2.0" }, { "fixed": "3.3.6" }, { "introduced": "3.4.0" }, { "fixed": "3.4.5" }, { "introduced": "3.5.0" }, { "fixed": "3.5.3" } ], "type": "ECOSYSTEM" } ] }