-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/juju/juju | go | < 2.9.50 | 2.9.50 |
The vulnerability stemmed from error messages revealing the valid context ID when an invalid one was provided. The key change in the patch modifies the error message in the 'getCmd' closure within startJujucServer from 'expected context id %q, got %q' to 'wrong context ID; got %q', removing exposure of the valid ID. This function's pre-patch behavior directly enabled the context ID leak described in the advisory.
Ongoing coverage of React2Shell