Security Advisory 2022-01
|Summary||Cleartext Storage of Sensitive Information in Octopus Tentacle Windows Docker image (CVE-2021-31821)|
|Discovery Date||10 Dec 2021|
|Patch Release Date||13 Jan 2022|
|Advisory Release Date||19 Jan 2022|
|Operating System||Windows Docker Image|
Customers who have downloaded and installed any of the Octopus Windows Tentacle Docker Image versions listed below ("Details") are affected.
Please upgrade your Octopus Windows Tentacle Docker Image immediately to fix this vulnerability.
Customers who have upgraded Octopus Windows Tentacle Docker Image to version 6.1.1266 or higher are not affected.
Octopus Deploy has given this vulnerability a medium rating. This rating was given according to the Octopus Deploy security levels, which ranks vulnerabilities as critical, high, medium, or low severity.
This is our assessment and you should evaluate its applicability to your own environment.
When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
The versions of Octopus Windows Tentacle Docker Image affected by this vulnerability are:
- All versions prior to 6.1.1266
To address this vulnerability, we have released Octopus Windows Tentacle Docker Image version:
- 6.1.1266 that contains a fix for these issues.
The latest versions of Octopus Windows Tentacle Docker Image can be downloaded from https://hub.docker.com/r/octopusdeploy/tentacle
What You Need to Do
Octopus Deploy recommends that you upgrade to the latest version (6.1.1266). You can download the latest version of
If you can't upgrade to the latest version (6.1.1266):
|If you have feature version...||...then upgrade to this version|
|3.x or greater||6.1.1266|
There are no known mitigations for CVE-2021-31821, it is important to upgrade to a fixed version as soon as possible.
If you have any questions or concerns regarding this advisory, please contact our support team (https://octopus.com/support).
Exploitation and Public Announcements
The Octopus Deploy security team is not aware of any malicious use of the vulnerability that is described in this advisory.
This vulnerability was found by a customer of Octopus Deploy.