This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Octopus First view 2017-07-17
Product Octopus Server Last view 2022-11-01
Version 3.12.3 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:octopus:octopus_server

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2022-11-01 CVE-2022-2572

In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.

9.1 2022-10-27 CVE-2022-2782

In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.

5.3 2022-10-27 CVE-2022-2508

In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.

8.1 2022-10-14 CVE-2022-2780

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

6.5 2022-10-13 CVE-2022-2828

In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability

5.3 2022-10-12 CVE-2022-2720

In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.

5.3 2022-10-06 CVE-2022-2783

In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

5.3 2022-10-06 CVE-2022-2781

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

9.8 2022-09-30 CVE-2022-2778

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

4.3 2022-09-28 CVE-2022-2760

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

6.5 2022-09-09 CVE-2022-2528

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

7.5 2022-08-19 CVE-2022-2075

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

7.5 2022-08-19 CVE-2022-2074

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

7.5 2022-08-19 CVE-2022-2049

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

5.3 2022-08-19 CVE-2022-1901

In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

5.3 2022-07-19 CVE-2022-30532

In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

6.1 2022-07-15 CVE-2022-29890

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link.

5.3 2022-07-15 CVE-2022-1881

In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space.

7.5 2022-06-13 CVE-2022-2013

In Octopus Server after version 2022.1.1495 and before 2022.1.2647 if private spaces were enabled via the experimental feature flag all new users would have access to the Script Console within their private space.

7.5 2022-05-19 CVE-2022-1670

When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.

6.1 2022-02-07 CVE-2022-23184

In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.

7.8 2021-10-07 CVE-2021-26556

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

7.5 2021-08-18 CVE-2021-31820

In Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.

6.1 2020-10-26 CVE-2020-26161

In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.

7.5 2020-10-22 CVE-2020-27155

An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one.

CWE : Common Weakness Enumeration

%idName
16% (7) CWE-532 Information Leak Through Log Files
9% (4) CWE-269 Improper Privilege Management
9% (4) CWE-200 Information Exposure
9% (4) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
7% (3) CWE-312 Cleartext Storage of Sensitive Information
4% (2) CWE-639 Access Control Bypass Through User-Controlled Key
4% (2) CWE-613 Insufficient Session Expiration
4% (2) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
4% (2) CWE-209 Information Exposure Through an Error Message
2% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
2% (1) CWE-476 NULL Pointer Dereference
2% (1) CWE-434 Unrestricted Upload of File with Dangerous Type
2% (1) CWE-426 Untrusted Search Path
2% (1) CWE-352 Cross-Site Request Forgery (CSRF)
2% (1) CWE-326 Inadequate Encryption Strength
2% (1) CWE-311 Missing Encryption of Sensitive Data
2% (1) CWE-294 Authentication Bypass by Capture-replay
2% (1) CWE-287 Improper Authentication
2% (1) CWE-276 Incorrect Default Permissions
2% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
2% (1) CWE-20 Improper Input Validation