This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Octopus First view 2017-07-17
Product Octopus Server Last view 2025-04-10
Version 3.4.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:octopus:octopus_server

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2025-04-10 CVE-2025-0539

In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.

5.3 2025-02-11 CVE-2025-0589

In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself.

4.9 2025-02-11 CVE-2025-0588

In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated.

5.4 2025-02-11 CVE-2025-0526

In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.

7.5 2025-02-11 CVE-2025-0525

In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server.

5.4 2025-02-11 CVE-2025-0513

In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message.

9.8 2024-09-30 CVE-2024-9194

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Linux and Microsoft Windows Octopus Server on Windows, Linux allows SQL Injection.This issue affects Octopus Server: from 2024.1.0 before 2024.1.13038, from 2024.2.0 before 2024.2.9482, from 2024.3.0 before 2024.3.12766.

0 2024-09-11 CVE-2024-1656

Affected versions of Octopus Server had a weak content security policy.

0 2024-08-21 CVE-2024-7998

In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan.

0 2024-07-25 CVE-2024-6972

In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text.

0 2024-07-25 CVE-2024-4811

In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.

5.4 2024-05-08 CVE-2024-4456

In affected versions of Octopus Server with certain access levels it was possible to embed a Cross-Site Scripting payload on the audit page.

0 2024-04-30 CVE-2024-4226

It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed.

0 2024-04-18 CVE-2023-4509

It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt.

7.5 2024-04-09 CVE-2024-2975

A race condition was identified through which privilege escalation was possible in certain configurations.

7.5 2023-12-14 CVE-2023-1904

In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server.

4.3 2023-08-02 CVE-2022-2416

In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment.

4.3 2023-08-02 CVE-2022-2346

In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints.

5.3 2023-05-18 CVE-2022-4870

In affected versions of Octopus Deploy it is possible to discover network details via error message

5.5 2023-05-10 CVE-2022-4008

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

5.3 2023-04-19 CVE-2022-2507

In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage

8.8 2023-03-16 CVE-2022-4009

In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation

4.3 2023-03-13 CVE-2022-2259

In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items

4.3 2023-03-13 CVE-2022-2258

In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items

7.5 2023-02-22 CVE-2022-2883

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

CWE : Common Weakness Enumeration

%idName
15% (7) CWE-532 Information Leak Through Log Files
11% (5) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
6% (3) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
6% (3) CWE-312 Cleartext Storage of Sensitive Information
6% (3) CWE-269 Improper Privilege Management
6% (3) CWE-209 Information Exposure Through an Error Message
4% (2) CWE-639 Access Control Bypass Through User-Controlled Key
4% (2) CWE-434 Unrestricted Upload of File with Dangerous Type
4% (2) CWE-200 Information Exposure
2% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
2% (1) CWE-613 Insufficient Session Expiration
2% (1) CWE-426 Untrusted Search Path
2% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (1) CWE-352 Cross-Site Request Forgery (CSRF)
2% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
2% (1) CWE-311 Missing Encryption of Sensitive Data
2% (1) CWE-295 Certificate Issues
2% (1) CWE-294 Authentication Bypass by Capture-replay
2% (1) CWE-287 Improper Authentication
2% (1) CWE-276 Incorrect Default Permissions
2% (1) CWE-212 Improper Cross-boundary Removal of Sensitive Data
2% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
2% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...