Octopus

Octopus Server

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 25.02.2026 12:22:18
  • Zuletzt bearbeitet 27.02.2026 15:16:26

In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.

  • EPSS 0.14%
  • Veröffentlicht 10.04.2025 05:20:38
  • Zuletzt bearbeitet 02.07.2025 17:23:54

In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and po...

  • EPSS 0.11%
  • Veröffentlicht 11.02.2025 12:15:34
  • Zuletzt bearbeitet 02.07.2025 17:24:09

In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses wo...

  • EPSS 0.11%
  • Veröffentlicht 11.02.2025 11:15:15
  • Zuletzt bearbeitet 02.07.2025 17:23:30

In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.

  • EPSS 0.06%
  • Veröffentlicht 11.02.2025 11:15:15
  • Zuletzt bearbeitet 02.07.2025 17:24:18

In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message.

  • EPSS 0.12%
  • Veröffentlicht 11.02.2025 10:15:09
  • Zuletzt bearbeitet 02.07.2025 17:24:44

In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server.

  • EPSS 0.24%
  • Veröffentlicht 11.02.2025 09:15:09
  • Zuletzt bearbeitet 02.07.2025 17:25:02

In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Di...

  • EPSS 0.52%
  • Veröffentlicht 30.09.2024 23:15:02
  • Zuletzt bearbeitet 02.07.2025 17:25:50

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Linux and Microsoft Windows Octopus Server on Windows, Linux allows SQL Injection.This issue affects Octopus Server: from 2024.1.0 before 2024.1.130...

  • EPSS 0.49%
  • Veröffentlicht 11.09.2024 05:15:02
  • Zuletzt bearbeitet 02.07.2025 17:26:16

Affected versions of Octopus Server had a weak content security policy.

  • EPSS 0.27%
  • Veröffentlicht 21.08.2024 06:15:13
  • Zuletzt bearbeitet 02.07.2025 17:26:30

In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan.