The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
References
Link | Resource |
---|---|
https://github.com/juju/juju/security/advisories/GHSA-r64v-82fh-xc63 | Vendor Advisory Exploit |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* | |
References | () https://github.com/juju/juju/security/advisories/GHSA-r64v-82fh-xc63 - Vendor Advisory, Exploit | |
CWE | NVD-CWE-noinfo | |
First Time |
Canonical
Canonical juju |
10 Jul 2025, 13:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 17:16
Updated : 2025-08-26 17:54
NVD link : CVE-2025-53512
Mitre link : CVE-2025-53512
CVE.ORG link : CVE-2025-53512
JSON object : View
Products Affected
canonical
- juju
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-285Improper Authorization
NVD-CWE-noinfo