The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.
References
Link | Resource |
---|---|
https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 - Exploit, Vendor Advisory | |
First Time |
Canonical
Canonical juju |
|
CWE | CWE-22 | |
CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* |
10 Jul 2025, 13:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 17:16
Updated : 2025-08-26 17:54
NVD link : CVE-2025-53513
Mitre link : CVE-2025-53513
CVE.ORG link : CVE-2025-53513
JSON object : View
Products Affected
canonical
- juju