Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w5fq-8965-c969 | Juju: CloudSpec method leaking cloud credentials |
Thu, 30 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:* |
Fri, 10 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical juju |
|
| Vendors & Products |
Canonical
Canonical juju |
Fri, 10 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privileged user to access sensitive credentials. This issue is resolved in Juju versions 2.9.57 and 3.6.21. | |
| Title | Juju CloudSpec API could leak senstive information | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-10T14:04:30.155Z
Reserved: 2026-04-02T07:07:23.750Z
Link: CVE-2026-5412
Updated: 2026-04-10T14:04:08.292Z
Status : Analyzed
Published: 2026-04-10T13:16:45.780
Modified: 2026-04-30T15:18:26.430
Link: CVE-2026-5412
No data.
OpenCVE Enrichment
Updated: 2026-04-13T13:06:04Z
Github GHSA