Octopus

Octopus Deploy

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.77%
  • Veröffentlicht 19.03.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:50

In Octopus Deploy before 2020.1.5, for customers running on-premises Active Directory linked to their Octopus server, an authenticated user can leverage a bug to escalate privileges.

  • EPSS 0.22%
  • Veröffentlicht 28.11.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:40

In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backport...

  • EPSS 0.17%
  • Veröffentlicht 28.11.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:40

In Octopus Deploy before 2019.10.7, in a configuration where SSL offloading is enabled, the CSRF cookie was sometimes sent without the secure attribute. (The fix for this was backported to LTS versions 2019.6.14 and 2019.9.8.)

  • EPSS 0.58%
  • Veröffentlicht 18.11.2019 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:10

In Octopus Deploy 3.3.0 through 2019.10.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted package, triggering an exception that exposes underlying operating system details.

  • EPSS 0.44%
  • Veröffentlicht 05.08.2019 12:15:11
  • Zuletzt bearbeitet 21.11.2024 04:26:54

In Octopus Deploy 2019.4.0 through 2019.6.x before 2019.6.6, and 2019.7.x before 2019.7.6, an authenticated system administrator is able to view sensitive values by visiting a server configuration page or making an API call.

  • EPSS 0.59%
  • Veröffentlicht 25.07.2019 16:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:20

In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. ...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 01.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:29

In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different proj...

  • EPSS 0.24%
  • Veröffentlicht 20.02.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:42

An Information Exposure issue in the Terraform deployment step in Octopus Deploy before 2019.1.8 (and before 2018.10.4 LTS) allows remote authenticated users to view sensitive Terraform output variables via log files.

  • EPSS 0.15%
  • Veröffentlicht 26.06.2018 11:29:00
  • Zuletzt bearbeitet 21.11.2024 03:46:02

In Octopus Deploy 3.0 onwards (before 2018.6.7), an authenticated user with incorrect permissions may be able to create Accounts under the Infrastructure menu.

Exploit
  • EPSS 0.23%
  • Veröffentlicht 01.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:36

In Octopus Deploy 3.4.x before 2018.4.7, an authenticated user is able to view/update/save variable values within the Tenant Variables area for Environments that do not exist within their associated Team scoping. This occurs in situations where this ...