Skip to main content

Server-Side Request Forgery (SSRF)


Severity High
Score 9.8/10


A Server-Side Request Forgery vulnerability exists in where attackers can forge HTTP requests to manipulate the charm data directory to access or delete anything on the server. We recommend that all users running self-hosted charm instances to update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. Users running the official Charm Docker images are at minimal risk because the exploit is limited to the containerized filesystem. This issue affects versions 0.9.0 through 0.12.0.

  • LOW
  • HIGH
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-918 - Server-Side Request Forgery (SSRF)

Server-side request forgery (SSRF) is a weakness that allows an attacker to send an arbitrary request, making it appear that the request was sent by the server. This request may bypass a firewall that would normally prevent direct access to the URL. The impact of this vulnerability can vary from unauthorized access to files and sensitive information to remote code execution.

Advisory Timeline

  • Published