This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Octopus First view 2017-07-17
Product Octopus Server Last view 2023-12-14
Version 3.1.6 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:octopus:octopus_server

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2023-12-14 CVE-2023-1904

In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server.

4.3 2023-08-02 CVE-2022-2416

In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment.

4.3 2023-08-02 CVE-2022-2346

In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints.

5.3 2023-05-18 CVE-2022-4870

In affected versions of Octopus Deploy it is possible to discover network details via error message

5.5 2023-05-10 CVE-2022-4008

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

5.3 2023-04-19 CVE-2022-2507

In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage

8.8 2023-03-16 CVE-2022-4009

In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation

4.3 2023-03-13 CVE-2022-2259

In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items

4.3 2023-03-13 CVE-2022-2258

In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items

7.5 2023-02-22 CVE-2022-2883

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

5.4 2023-01-31 CVE-2022-4898

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS

6.1 2023-01-03 CVE-2022-3614

In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.

7.5 2023-01-03 CVE-2022-3460

In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview.

7.5 2022-11-25 CVE-2022-2721

In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled.

9.8 2022-11-01 CVE-2022-2572

In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.

9.1 2022-10-27 CVE-2022-2782

In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.

5.3 2022-10-27 CVE-2022-2508

In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.

8.1 2022-10-14 CVE-2022-2780

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

6.5 2022-10-13 CVE-2022-2828

In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability

5.3 2022-10-12 CVE-2022-2720

In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.

5.3 2022-10-06 CVE-2022-2783

In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

5.3 2022-10-06 CVE-2022-2781

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

9.8 2022-09-30 CVE-2022-2778

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

4.3 2022-09-28 CVE-2022-2760

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

6.5 2022-09-09 CVE-2022-2528

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

CWE : Common Weakness Enumeration

%idName
16% (7) CWE-532 Information Leak Through Log Files
11% (5) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
6% (3) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
6% (3) CWE-312 Cleartext Storage of Sensitive Information
6% (3) CWE-269 Improper Privilege Management
6% (3) CWE-209 Information Exposure Through an Error Message
4% (2) CWE-639 Access Control Bypass Through User-Controlled Key
4% (2) CWE-434 Unrestricted Upload of File with Dangerous Type
4% (2) CWE-200 Information Exposure
2% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
2% (1) CWE-613 Insufficient Session Expiration
2% (1) CWE-426 Untrusted Search Path
2% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (1) CWE-352 Cross-Site Request Forgery (CSRF)
2% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
2% (1) CWE-311 Missing Encryption of Sensitive Data
2% (1) CWE-294 Authentication Bypass by Capture-replay
2% (1) CWE-287 Improper Authentication
2% (1) CWE-276 Incorrect Default Permissions
2% (1) CWE-212 Improper Cross-boundary Removal of Sensitive Data
2% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
2% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...