Untriaged
Permalink
CVE-2025-53512
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Sensitive log retrieval in Juju
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
Affected products
juju
- <3.6.8
- <2.9.52
Package maintainers
-
@RealityAnomaly Alex Zero <alex@arctarus.co.uk>
-
@emilazy Emily <nixpkgs@emily.moe>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>
-
@0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev>
-
@bbigras Bruno Bigras <bigras.bruno@gmail.com>