{"vulnerability": "CVE-2024-41129", "sightings": [{"uuid": "1ca3df83-a925-4874-a4dd-ac5f904b25d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41129", "type": "seen", "source": "https://t.me/cvedetector/1457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41129 - \"Ops Library Kerberos Secret Exfiltration Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-41129 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : The ops library is a Python framework for developing and testing Kubernetes and machine charms. The issue here is that ops passes the secret content as one of the args via CLI. This issue may affect any of the charms that are using: Juju (&gt;=3.0), Juju secrets and not correctly capturing and processing `subprocess.CalledProcessError`. This vulnerability is fixed in 2.15.0. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:49:59.000000Z"}]}