Loading HuntDB...

Vulnerabilities

CVE-2024-12226

MEDIUM

In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly.

Published Jan 16, 2025

CVE-2024-1656

LOW

Affected versions of Octopus Server had a weak content security policy.

Published Sep 11, 2024

CVE-2024-7998

LOW

In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan.

Published Aug 21, 2024

CVE-2024-6972

MEDIUM

In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text.

Published Jul 25, 2024

CVE-2024-4811

LOW

In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.

Published Jul 25, 2024

CVE-2024-4456

MEDIUM

In affected versions of Octopus Server with certain access levels it was possible to embed a Cross-Site Scripting payload on the audit page.

Published May 08, 2024

CVE-2024-4226

LOW

It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed.

Published Apr 30, 2024

CVE-2023-4509

MEDIUM

It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt.

Published Apr 17, 2024

CVE-2024-2975

HIGH

A race condition was identified through which privilege escalation was possible in certain configurations.

Published Apr 09, 2024

CVE-2023-1904

MEDIUM

In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server.

Published Dec 14, 2023

CVE-2022-2416

MEDIUM

In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment.

Published Aug 02, 2023

CVE-2022-2346

MEDIUM

In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints.

Published Aug 02, 2023

CVE-2022-4870

UNKNOWN

In affected versions of Octopus Deploy it is possible to discover network details via error message

Published May 18, 2023

CVE-2022-4008

UNKNOWN

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

Published May 10, 2023

CVE-2023-2247

UNKNOWN

In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function

Published May 02, 2023

CVE-2022-2507

UNKNOWN

In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage

Published Apr 19, 2023

CVE-2022-4009

UNKNOWN

In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation

Published Mar 16, 2023

CVE-2022-2258

UNKNOWN

In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items

Published Mar 13, 2023

CVE-2022-2259

UNKNOWN

In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items

Published Mar 13, 2023

CVE-2022-2883

UNKNOWN

In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service

Published Feb 22, 2023

CVE-2022-4898

UNKNOWN

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS

Published Jan 31, 2023

CVE-2022-3614

UNKNOWN

In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.

Published Jan 03, 2023

CVE-2022-3460

UNKNOWN

In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview.

Published Jan 02, 2023

CVE-2022-2721

UNKNOWN

In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled.

Published Nov 25, 2022

CVE-2022-2572

UNKNOWN

In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.

Published Nov 01, 2022

CVE-2022-2508

UNKNOWN

In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.

Published Oct 27, 2022

CVE-2022-2782

UNKNOWN

In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.

Published Oct 26, 2022

CVE-2022-2780

UNKNOWN

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

Published Oct 14, 2022

CVE-2022-2828

UNKNOWN

In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability

Published Oct 13, 2022

CVE-2022-2720

UNKNOWN

In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.

Published Oct 12, 2022

CVE-2022-2781

UNKNOWN

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

Published Oct 06, 2022

CVE-2022-2783

UNKNOWN

In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token

Published Oct 06, 2022

CVE-2022-2778

UNKNOWN

In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.

Published Sep 30, 2022

CVE-2022-2760

UNKNOWN

In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.

Published Sep 28, 2022

CVE-2022-2528

UNKNOWN

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

Published Sep 09, 2022

CVE-2022-2075

UNKNOWN

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.

Published Aug 19, 2022

CVE-2022-2074

UNKNOWN

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.

Published Aug 19, 2022

CVE-2022-2049

UNKNOWN

In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.

Published Aug 19, 2022

CVE-2022-1901

UNKNOWN

In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.

Published Aug 19, 2022

CVE-2022-30532

UNKNOWN

In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.

Published Jul 19, 2022

CVE-2022-29890

UNKNOWN

In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link.

Published Jul 15, 2022

CVE-2022-1881

UNKNOWN

In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space.

Published Jul 15, 2022

CVE-2022-2013

UNKNOWN

In Octopus Server after version 2022.1.1495 and before 2022.1.2647 if private spaces were enabled via the experimental feature flag all new users would have access to the Script Console within their private space.

Published Jun 12, 2022

CVE-2022-1670

UNKNOWN

When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.

Published May 19, 2022

CVE-2022-23184

UNKNOWN

In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects.

Published Feb 07, 2022

CVE-2021-31821

UNKNOWN

When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image

Published Jan 19, 2022

CVE-2021-31822

UNKNOWN

When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.

Published Nov 24, 2021

CVE-2021-26557

UNKNOWN

When Octopus Tentacle is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

Published Oct 07, 2021

CVE-2021-26556

UNKNOWN

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.

Published Oct 07, 2021

CVE-2021-31819

UNKNOWN

In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.

Published Sep 22, 2021