Octopus Deploy Security Advisories
Home
Advisories icon
2021 2022 2023
Severity Levels
Disclosure Policy
  • Security Advisory 2022-25

    Dec 21, 2022 · Vulnerability/Exposure of Sensitive Information Through Environmental Variables Severity/medium CVSS/5.9

    Certain types of sensitive variables may be displayed as plain text in variable preview (CVE-2022-3460)

    Read More
  • Security Advisory 2022-24

    Nov 25, 2022 · Vulnerability/Insertion of Sensitive Information into Log File Severity/medium CVSS/4.1

    Target Discovery prints certain sensitive values in plain-text when verbose logging is enabled (CVE-2022-2721)

    Read More
  • Security Advisory 2022-23

    Nov 1, 2022 · Vulnerability/Broken access control Severity/high CVSS/7.3

    Disabled/Deleted users API keys are still usable when access is revoked via an External Auth Provider (CVE-2022-2572)

    Read More
  • Security Advisory 2022-22

    Oct 27, 2022 · Vulnerability/Information Exposure Severity/low CVSS/3.6

    Resource validation in error messaging (CVE-2022-2508)

    Read More
  • Security Advisory 2022-21

    Oct 25, 2022 · Vulnerability/Insufficient Session Expiration Severity/medium CVSS/5.7

    Session cookie date isn't validated against server policy (CVE-2022-2782)

    Read More
  • Security Advisory 2022-20

    Oct 14, 2022 · Vulnerability/Authentication Bypass by Capture-replay Severity/high CVSS/8.0

    Git connection checker can initiate an SMB connection leading to NTLM relay attack (CVE-2022-2780)

    Read More
  • Security Advisory 2022-19

    Oct 13, 2022 · Vulnerability/Information exposure Severity/medium CVSS/5.7

    User without team permission can obtain teams along with its members, description and permissions associated through API request (CVE-2022-2828)

    Read More
  • Security Advisory 2022-18

    Oct 11, 2022 · Vulnerability/Information exposure Severity/medium CVSS/5.4

    Sensitive value will only be partially masked when certain substrings exist in the set (CVE-2022-2720)

    Read More
  • Security Advisory 2022-17

    Oct 6, 2022 · Vulnerability/CSRF Severity/medium CVSS/6.3

    Session cookie can be used as the CSRF token (CVE-2022-2783)

    Read More
  • Security Advisory 2022-16

    Oct 5, 2022 · Vulnerability/Encryption Severity/medium CVSS/5.5

    Encrypted variables and session cookies use the same encryption process (CVE-2022-2781)

    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • »
    • »»

Recent Security Advisories

  • Security Advisory 2023-09
  • Security Advisory 2023-08
  • Security Advisory 2023-07
  • Security Advisory 2023-06
  • Security Advisory 2023-05
  • Security Advisory 2023-03
  • Security Advisory 2023-04
  • Security Advisory 2023-02

Products

OCTOPUS-SERVER 41 OCTOPUS-TENTACLE 4 OCTOPUS-DEPLOY-TEAMCITY-PLUGIN 3 OCTOPUS-JAVA-SDK 3 HALIBUT 1

Tags

SEVERITY/MEDIUM 26 SEVERITY/LOW 16 SEVERITY/HIGH 10 VULNERABILITY/VULNERABLE-DEPENDENCY 6 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE 5 CVSS/6.5 4 VULNERABILITY/BROKEN-ACCESS-CONTROL 4 VULNERABILITY/INFORMATION-EXPOSURE 4 CVSS/5.7 3 CVSS/6.4 3 CVSS/6.8 3 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION 3 VULNERABILITY/REGEX-DENIAL-OF-SERVICE 3 VULNERABILITY/REMOTE-CODE-EXECUTION 3
All Tags
CVSS/2.21 CVSS/2.41 CVSS/2.51 CVSS/3.01 CVSS/3.12 CVSS/3.41 CVSS/3.51 CVSS/3.61 CVSS/3.81 CVSS/3.91 CVSS/4.11 CVSS/4.31 CVSS/5.31 CVSS/5.41 CVSS/5.51 CVSS/5.73 CVSS/5.91 CVSS/6.32 CVSS/6.43 CVSS/6.54 CVSS/6.83 CVSS/7.11 CVSS/7.31 CVSS/8.01 SEVERITY/HIGH10 SEVERITY/LOW16 SEVERITY/MEDIUM26 VULNERABILITY/ABNORMAL-INVITE-CODE-FUNCTIONALITY1 VULNERABILITY/AUTHENTICATION-BYPASS-BY-CAPTURE-REPLAY1 VULNERABILITY/AUTHENTICATION-BYPASS-USING-AN-ALTERNATE-PATH-OR-CHANNEL1 VULNERABILITY/BROKEN-ACCESS-CONTROL4 VULNERABILITY/CLEAR-TEXT-STORAGE-OF-SENSITIVE-VALUE5 VULNERABILITY/CROSS-SITE-SCRIPTING-XSS1 VULNERABILITY/CSRF1 VULNERABILITY/DENIAL-OF-SERVICE2 VULNERABILITY/ENCRYPTION1 VULNERABILITY/EXPOSURE-OF-SENSITIVE-INFORMATION-THROUGH-ENVIRONMENTAL-VARIABLES1 VULNERABILITY/IMPROPER-NEUTRALISATION-OF-SPECIAL-ELEMENTS-USED-IN-A-COMMAND1 VULNERABILITY/INCORRECT-PRIVILEGE-ASSIGNMENT2 VULNERABILITY/INFORMATION-EXPOSURE4 VULNERABILITY/INSECURE-DIRECT-OBJECT-REFERENCE-IDOR1 VULNERABILITY/INSERTION-OF-SENSITIVE-INFORMATION-INTO-LOG-FILE1 VULNERABILITY/INSUFFICIENT-SESSION-EXPIRATION1 VULNERABILITY/LOCAL-PRIVILEGE-ESCALATION3 VULNERABILITY/LOGGING1 VULNERABILITY/OPEN-REDIRECT1 VULNERABILITY/RATE-LIMIT-BYPASS1 VULNERABILITY/REGEX-DENIAL-OF-SERVICE3 VULNERABILITY/REMOTE-CODE-EXECUTION3 VULNERABILITY/SENSITIVE-VARIABLE-EXPOSURE1 VULNERABILITY/SERVER-SIDE-REQUEST-FORGERY1 VULNERABILITY/SQL-INJECTION1 VULNERABILITY/STORED-XSS2 VULNERABILITY/VARIABLE-SECRET-EXPOSURE1 VULNERABILITY/VULNERABLE-DEPENDENCY6
[A~Z][0~9]
 Octopus Deploy Security Advisories

Copyright   OCTOPUS DEPLOY SECURITY ADVISORIES. All Rights Reserved