Security Advisory 2022-01
Summary | Cleartext Storage of Sensitive Information in Octopus Tentacle Windows Docker image (CVE-2021-31821) |
Advisory Number | 2022-01 |
Discovery Date | 10 Dec 2021 |
Patch Release Date | 13 Jan 2022 |
Advisory Release Date | 19 Jan 2022 |
Product | Octopus Tentacle |
Operating System | Windows Docker Image |
Severity | Medium |
CVE ID | CVE-2021-31821 |
Customers who have downloaded and installed any of the Octopus Windows Tentacle Docker Image versions listed below ("Details") are affected.
Please upgrade your Octopus Windows Tentacle Docker Image immediately to fix this vulnerability.
Customers who have upgraded Octopus Windows Tentacle Docker Image to version 6.1.1266 or higher are not affected.
Severity
Octopus Deploy has given this vulnerability a medium rating. This rating was given according to the Octopus Deploy severity levels, which ranks vulnerabilities as critical, high, medium, or low severity.
This is our assessment and you should evaluate its applicability to your own environment.
Details
When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
The versions of Octopus Windows Tentacle Docker Image affected by this vulnerability are:
- All versions prior to 6.1.1266
Fix
To address this vulnerability, we have released Octopus Windows Tentacle Docker Image version:
- 6.1.1266 that contains a fix for these issues.
The latest versions of Octopus Windows Tentacle Docker Image can be downloaded from https://hub.docker.com/r/octopusdeploy/tentacle
What You Need to Do
Octopus Deploy recommends that you upgrade to the latest version (6.1.1266). You can download the latest version of
If you can't upgrade to the latest version (6.1.1266):
If you have feature version... | ...then upgrade to this version |
---|---|
3.x or greater | 6.1.1266 |
Mitigation
There are no known mitigations for CVE-2021-31821, it is important to upgrade to a fixed version as soon as possible.
Support
If you have any questions or concerns regarding this advisory, please contact our support team https://octopus.com/support.
Exploitation and Public Announcements
The Octopus Deploy security team is not aware of any malicious use of the vulnerability that is described in this advisory.
Source
This vulnerability was found by a customer of Octopus Deploy.