Security Advisory 2021-16
|Summary||Octopus Deploy TeamCity Plugin log4j 2.16.0 dependency (CVE-2021-45105)|
|Discovery Date||19 Dec 2021|
|Patch Release Date||19 Dec 2021|
|Advisory Release Date||20 Dec 2021|
|Product||Octopus Deploy TeamCity Plugin|
|Operating System||Linux and Windows|
|CVE ID||CVE-2021-45105 (Apache Software Foundation)|
Customers who have upgraded Octopus Deploy TeamCity Plugin to version 6.1.9 or higher are not affected.
Octopus Deploy has given this vulnerability a low rating. This rating was given according to the Octopus Deploy severity levels, which ranks vulnerabilities as critical, high, medium, or low severity.
This is our assessment and you should evaluate its applicability to your own environment.
Another denial of service vulnerability in log4j has been found in version 2.16.0 (CVE-2021-45105) which has been patched in 2.17.0. A new version of the TeamCity plugin has been released to address the vulnerability.
The versions of Octopus Deploy TeamCity Plugin affected by this vulnerability is:
- Version 6.1.8
To address this vulnerability, we have released Octopus Deploy TeamCity Plugin version:
- 6.1.9 which contains a fix for this issue.
The latest versions of Octopus Deploy products can be downloaded from https://octopus.com/downloads or from the JetBrains plugin downloads https://plugins.jetbrains.com/plugin/9038-octopus-deploy-integration/
What You Need to Do
Octopus Deploy recommends that you upgrade to the latest version (6.1.9). You can download the latest version of 6.1.9 from https://octopus.com/downloads or from https://plugins.jetbrains.com/plugin/9038-octopus-deploy-integration/
The previous mitigation provided were discovered to only limit exposure. There is no known mitigation for CVE-2021-45105, it is important to upgrade to a fixed version as soon as possible.
If you have any questions or concerns regarding this advisory, please contact our support team https://octopus.com/support.