Octopus Server 2018.8.0

CPE Details

Octopus Server 2018.8.0
2018.8.0
2022-07-27
14h39 +00:00
2022-07-27
14h40 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:octopus:octopus_server:2018.8.0:*:*:*:*:*:*:*

Informations

Vendor

octopus

Product

octopus_server

Version

2018.8.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-4870 2023-05-17 22h00 +00:00 In affected versions of Octopus Deploy it is possible to discover network details via error message
5.3
Moyen
CVE-2022-4008 2023-05-10 00h00 +00:00 In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service
5.5
Moyen
CVE-2022-2507 2023-04-19 00h00 +00:00 In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage
5.3
Moyen
CVE-2022-4009 2023-03-16 00h00 +00:00 In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation
8.8
Haute
CVE-2022-2883 2023-02-22 00h00 +00:00 In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service
7.5
Haute
CVE-2022-3614 2023-01-02 23h00 +00:00 In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.
6.1
Moyen
CVE-2022-3460 2023-01-01 23h00 +00:00 In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview.
7.5
Haute
CVE-2022-2572 2022-10-31 23h00 +00:00 In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.
9.8
Critique
CVE-2022-2508 2022-10-26 22h00 +00:00 In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.
5.3
Moyen
CVE-2022-2782 2022-10-25 22h00 +00:00 In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters.
9.1
Critique
CVE-2022-2720 2022-10-11 22h00 +00:00 In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work.
5.3
Moyen
CVE-2022-2781 2022-10-05 22h00 +00:00 In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.
5.3
Moyen
CVE-2022-2783 2022-10-05 22h00 +00:00 In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token
5.3
Moyen
CVE-2022-2778 2022-09-29 22h00 +00:00 In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
9.8
Critique
CVE-2022-2528 2022-09-09 05h50 +00:00 In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.
6.5
Moyen
CVE-2022-2075 2022-08-19 07h10 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.
7.5
Haute
CVE-2022-2074 2022-08-19 07h00 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.
7.5
Haute
CVE-2022-2049 2022-08-19 06h45 +00:00 In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.
7.5
Haute
CVE-2022-30532 2022-07-19 04h50 +00:00 In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy.
5.3
Moyen
CVE-2022-1670 2022-05-19 02h25 +00:00 When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.
7.5
Haute
CVE-2018-18850 2018-10-31 02h00 +00:00 In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
8.8
Haute