The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.
References
| Link | Resource |
|---|---|
| https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
| https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Canonical juju
Canonical |
|
| References | () https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 - Exploit, Vendor Advisory | |
| CWE | CWE-22 | |
| CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* |
09 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8 - | |
| Summary |
|
08 Jul 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-08 17:16
Updated : 2025-08-26 17:54
NVD link : CVE-2025-53513
Mitre link : CVE-2025-53513
CVE.ORG link : CVE-2025-53513
JSON object : View
Products Affected
canonical
- juju
