
CVE-2022-2258
https://notcve.org/view.php?id=CVE-2022-2258
13 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items • https://advisories.octopus.com/post/2023/sa2023-03 •

CVE-2022-2259
https://notcve.org/view.php?id=CVE-2022-2259
13 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items • https://advisories.octopus.com/post/2023/sa2023-04 • CWE-284: Improper Access Control •

CVE-2022-2883
https://notcve.org/view.php?id=CVE-2022-2883
22 Feb 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-02 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-4898
https://notcve.org/view.php?id=CVE-2022-4898
31 Jan 2023 — In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS En las versiones afectadas de Octopus Server, la barra lateral de ayuda se puede personalizar para incluir un payload de Cross-Site Scripting... • https://advisories.octopus.com/post/2022/sa2023-01 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-3614
https://notcve.org/view.php?id=CVE-2022-3614
03 Jan 2023 — In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. • https://advisories.octopus.com/post/2022/sa2022-26 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2022-3460
https://notcve.org/view.php?id=CVE-2022-3460
02 Jan 2023 — In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview. • https://advisories.octopus.com/post/2022/sa2022-25 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVE-2022-2721
https://notcve.org/view.php?id=CVE-2022-2721
25 Nov 2022 — In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled. En las versiones afectadas de Octopus Server, es posible que el descubrimiento de destino imprima ciertos valores marcados como sensibles a los archivos de registro en texto plano cuando el registro detallado está habilitado. • https://advisories.octopus.com/post/2022/sa2022-24 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-2572
https://notcve.org/view.php?id=CVE-2022-2572
01 Nov 2022 — In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked. En las versiones afectadas de Octopus Server donde el acceso es administrado por un proveedor de autenticación externo, era posible que la/las claves API de un usuario deshabilitado/eliminado aún fueran válidas después de que se revocara el acceso. • https://advisories.octopus.com/post/2022/sa2022-23 • CWE-287: Improper Authentication •

CVE-2022-2508
https://notcve.org/view.php?id=CVE-2022-2508
27 Oct 2022 — In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging. En las versiones afectadas de Octopus Server es posible revelar la existencia de recursos en un espacio al que el usuario no tiene acceso debido a mensajes de error detallados. • https://advisories.octopus.com/post/2022/sa2022-22 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-2782
https://notcve.org/view.php?id=CVE-2022-2782
26 Oct 2022 — In affected versions of Octopus Server it is possible for a session token to be valid indefinitely due to improper validation of the session token parameters. En las versiones afectadas de Octopus Server, es posible que un token de sesión sea válido indefinidamente debido a una validación incorrecta de los parámetros del token de sesión. • https://advisories.octopus.com/post/2022/sa2022-21 • CWE-613: Insufficient Session Expiration •