The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Aug 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:canonical:juju:*:*:*:*:*:go:*:* |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information. | |
| Title | Sensitive log retrieval in Juju | |
| Weaknesses | CWE-200 CWE-285 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published: 2025-07-08T16:47:44.427Z
Updated: 2025-07-08T19:09:24.844Z
Reserved: 2025-07-02T08:52:42.036Z
Link: CVE-2025-53512
Updated: 2025-07-08T19:09:16.987Z
Status : Analyzed
Published: 2025-07-08T17:16:04.400
Modified: 2025-08-26T17:54:14.010
Link: CVE-2025-53512
No data.