Security Advisory 2021-12
|Summary||Octopus Deploy TeamCity Plugin log4j2 dependency (CVE-2021-44228)|
|Discovery Date||11 Dec 2021|
|Patch Release Date||11 Dec 2021|
|Advisory Release Date||13 Dec 2021|
|Product||Octopus Deploy TeamCity Plugin|
|Operating System||Linux and Windows|
|CVE ID||CVE-2021-44228 (Apache Software Foundation)|
Customers who have upgraded Octopus Deploy TeamCity Plugin to version 6.1.7 or higher are not affected.
Octopus Deploy has given this vulnerability a low rating. This rating was given according to the Octopus Deploy severity levels, which ranks vulnerabilities as critical, high, medium, or low severity.
This is our assessment and you should evaluate its applicability to your own environment.
The Octopus Deploy TeamCity plugin was using the log4j version which is affected by CVE-2021-44228. A new version has been deployed with the latest version of log4j to mitigate the vulnerability.
The versions of affected by this vulnerability are:
- Versions 6.1.5 and earlier
To address this vulnerability, we have released Octopus Deploy TeamCity Plugin version:
- 6.1.7 which contains a fix for this issue.
The latest versions of Octopus Deploy products can be downloaded from https://octopus.com/downloads or from the JetBrains plugin downloads https://plugins.jetbrains.com/plugin/9038-octopus-deploy-integration/
What You Need to Do
Octopus Deploy recommends that you upgrade to the latest version (6.1.7). You can download the latest version of 6.1.7 from https://octopus.com/downloads or from https://plugins.jetbrains.com/plugin/9038-octopus-deploy-integration/
The previous mitigation provided were discovered to only limit exposure. There is no known mitigation for CVE-2021-44228, it is important to upgrade to a fixed version as soon as possible.
If you have any questions or concerns regarding this advisory, please contact our support team https://octopus.com/support.