6.5
CVE-2019-19376
- EPSS 0.22%
- Veröffentlicht 28.11.2019 17:15:12
- Zuletzt bearbeitet 21.11.2024 04:34:40
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backported to LTS 2019.9.8 and LTS 2019.6.14.)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Octopus ≫ Octopus Deploy SwEdition- Version < 2019.10.7
Octopus ≫ Octopus Deploy SwEditionlts Version >= 2019.6.0 < 2019.6.14
Octopus ≫ Octopus Deploy SwEditionlts Version >= 2019.9.0 < 2019.9.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.22% | 0.442 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.