juju is vulnerable to improper verification of cryptographic signature due to inadequate validation of macaroons in cross-model authorization. This cou
more...
juju is vulnerable to improper verification of cryptographic signature due to inadequate validation of macaroons in cross-model authorization. This could allow an attacker to mint and use invalid macaroons to maintain unauthorized access to revoked or expired permissions, enabling unauthorized interactions between charms.
less...
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy