Octopus

Octopus Server

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 07.10.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:27

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

  • EPSS 0.14%
  • Veröffentlicht 18.08.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 06:06:17

In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.

  • EPSS 0.12%
  • Veröffentlicht 25.08.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:54

An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to...

  • EPSS 0.28%
  • Veröffentlicht 27.08.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:16

In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10.

  • EPSS 0.44%
  • Veröffentlicht 05.08.2019 12:15:11
  • Zuletzt bearbeitet 21.11.2024 04:26:54

In Octopus Deploy 2019.4.0 through 2019.6.x before 2019.6.6, and 2019.7.x before 2019.7.6, an authenticated system administrator is able to view sensitive values by visiting a server configuration page or making an API call.

Exploit
  • EPSS 0.33%
  • Veröffentlicht 01.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:29

In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different proj...

  • EPSS 0.24%
  • Veröffentlicht 20.02.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:42

An Information Exposure issue in the Terraform deployment step in Octopus Deploy before 2019.1.8 (and before 2018.10.4 LTS) allows remote authenticated users to view sensitive Terraform output variables via log files.

  • EPSS 53.43%
  • Veröffentlicht 31.10.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:44

In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, runn...

  • EPSS 0.28%
  • Veröffentlicht 11.06.2018 10:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:34

In Octopus Deploy version 2018.5.1 to 2018.5.7, a user with Task View is able to view a password for a Service Fabric Cluster, when the Service Fabric Cluster target is configured in Azure Active Directory security mode and a deployment is executed w...

  • EPSS 0.27%
  • Veröffentlicht 21.05.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:07

In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.