13 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function • https://advisories.octopus.com/post/2023/sa2023-07 •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 0

In affected Octopus Server versions when the server HTTP and HTTPS bindings are configured to localhost, Octopus Server will allow open redirects. En las versiones de Octopus Server afectadas, cuando los enlaces HTTP y HTTPS del servidor están configurados en localhost, Octopus Server permitirá las redirecciones abiertas • https://advisories.octopus.com/post/2022/sa2022-02 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access. Cuando Octopus Server se instala usando una ubicación de carpeta personalizada, las ACL de carpeta no se establecen correctamente y podrían conllevar a que un usuario no privilegiado use una carga lateral de DLL para conseguir acceso privilegiado • https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-%28CVE-2021-26556%29.1733296189.html • CWE-426: Untrusted Search Path •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one. Se detectó un problema en Octopus Deploy versiones hasta 2020.4.4. Si está habilitado, el endpoint websocket puede permitir a un host de tentacle no confiable presentarse como uno confiable • https://github.com/OctopusDeploy https://github.com/OctopusDeploy/Issues/issues/6637 https://github.com/OctopusDeploy/Issues/issues/6639 https://github.com/OctopusDeploy/Issues/issues/6640 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs. En Octopus Deploy versiones 3.1.0 hasta 2020.4.0, determinados scripts pueden revelar información confidencial al usuario en los registros de tareas • https://github.com/OctopusDeploy/Issues/issues/6604 https://github.com/OctopusDeploy/Issues/issues/6605 https://github.com/OctopusDeploy/Issues/issues/6606 https://github.com/OctopusDeploy/Issues/issues/6607 •