Security Advisory 2022-01

Summary Cleartext Storage of Sensitive Information in Octopus Tentacle Windows Docker image (CVE-2021-31821)
Advisory Number 2022-01
Discovery Date 10 Dec 2021
Patch Release Date 13 Jan 2022
Advisory Release Date 19 Jan 2022
Product Octopus Tentacle
Operating System Windows Docker Image
Severity Medium
CVE ID CVE-2021-31821

Customers who have downloaded and installed any of the Octopus Windows Tentacle Docker Image versions listed below ("Details") are affected.

Please upgrade your Octopus Windows Tentacle Docker Image immediately to fix this vulnerability.

Customers who have upgraded Octopus Windows Tentacle Docker Image to version 6.1.1266 or higher are not affected.

Severity

Octopus Deploy has given this vulnerability a medium rating. This rating was given according to the Octopus Deploy security levels, which ranks vulnerabilities as critical, high, medium, or low severity.

This is our assessment and you should evaluate its applicability to your own environment.

Details

When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image

The versions of Octopus Windows Tentacle Docker Image affected by this vulnerability are:

  • All versions prior to 6.1.1266

Fix

To address this vulnerability, we have released Octopus Windows Tentacle Docker Image version:

  • 6.1.1266 that contains a fix for these issues.

The latest versions of Octopus Windows Tentacle Docker Image can be downloaded from https://hub.docker.com/r/octopusdeploy/tentacle

What You Need to Do

Octopus Deploy recommends that you upgrade to the latest version (6.1.1266). You can download the latest version of from https://hub.docker.com/r/octopusdeploy/tentacle

If you can't upgrade to the latest version (6.1.1266):

If you have feature version... ...then upgrade to this version
3.x or greater 6.1.1266

Mitigation

There are no known mitigations for CVE-2021-31821, it is important to upgrade to a fixed version as soon as possible.

Support

If you have any questions or concerns regarding this advisory, please contact our support team (https://octopus.com/support).

Exploitation and Public Announcements

The Octopus Deploy security team is not aware of any malicious use of the vulnerability that is described in this advisory.

Source

This vulnerability was found by a customer of Octopus Deploy.