The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.
References
| Link | Resource |
|---|---|
| https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
| https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* | |
| References | () https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 - Exploit, Vendor Advisory | |
| First Time |
Canonical
Canonical juju |
|
| CWE | CWE-22 |
10 Jul 2025, 13:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-08 17:16
Updated : 2025-08-26 17:54
NVD link : CVE-2025-53513
Mitre link : CVE-2025-53513
CVE.ORG link : CVE-2025-53513
JSON object : View
Products Affected
canonical
- juju
