Octopus

Octopus Server

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 01.11.2022 02:15:10
  • Zuletzt bearbeitet 06.05.2025 04:15:56

In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.

  • EPSS 0.26%
  • Veröffentlicht 27.10.2022 10:15:10
  • Zuletzt bearbeitet 07.05.2025 19:16:04

In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.

  • EPSS 0.24%
  • Veröffentlicht 27.10.2022 10:15:10
  • Zuletzt bearbeitet 07.05.2025 14:15:30

In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.

  • EPSS 0.41%
  • Veröffentlicht 14.10.2022 07:15:08
  • Zuletzt bearbeitet 15.05.2025 15:15:53

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

  • EPSS 0.27%
  • Veröffentlicht 13.10.2022 05:15:08
  • Zuletzt bearbeitet 15.05.2025 14:15:24

In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability

  • EPSS 0.24%
  • Veröffentlicht 12.10.2022 07:15:08
  • Zuletzt bearbeitet 16.05.2025 15:15:46

In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.

  • EPSS 0.12%
  • Veröffentlicht 06.10.2022 18:15:58
  • Zuletzt bearbeitet 21.11.2024 07:01:41

In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

  • EPSS 0.06%
  • Veröffentlicht 06.10.2022 18:15:58
  • Zuletzt bearbeitet 21.11.2024 07:01:41

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

  • EPSS 0.59%
  • Veröffentlicht 30.09.2022 04:15:10
  • Zuletzt bearbeitet 20.05.2025 21:15:21

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

  • EPSS 0.24%
  • Veröffentlicht 28.09.2022 12:15:09
  • Zuletzt bearbeitet 21.05.2025 15:15:56

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.