
CVE-2022-4870
https://notcve.org/view.php?id=CVE-2022-4870
18 May 2023 — In affected versions of Octopus Deploy it is possible to discover network details via error message • https://advisories.octopus.com/post/2023/sa2023-09 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-4008
https://notcve.org/view.php?id=CVE-2022-4008
10 May 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-08 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-2507
https://notcve.org/view.php?id=CVE-2022-2507
19 Apr 2023 — In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage • https://advisories.octopus.com/post/2023/sa2023-06 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-4009
https://notcve.org/view.php?id=CVE-2022-4009
16 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation • https://advisories.octopus.com/post/2023/sa2023-05 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2022-2259
https://notcve.org/view.php?id=CVE-2022-2259
13 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items • https://advisories.octopus.com/post/2023/sa2023-04 • CWE-284: Improper Access Control •

CVE-2022-2258
https://notcve.org/view.php?id=CVE-2022-2258
13 Mar 2023 — In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items • https://advisories.octopus.com/post/2023/sa2023-03 •

CVE-2022-2883
https://notcve.org/view.php?id=CVE-2022-2883
22 Feb 2023 — In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service • https://advisories.octopus.com/post/2023/sa2023-02 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-3614
https://notcve.org/view.php?id=CVE-2022-3614
03 Jan 2023 — In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. • https://advisories.octopus.com/post/2022/sa2022-26 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2022-3460
https://notcve.org/view.php?id=CVE-2022-3460
02 Jan 2023 — In affected versions of Octopus Deploy it is possible for certain types of sensitive variables to inadvertently become unmasked when viewed in variable preview. • https://advisories.octopus.com/post/2022/sa2022-25 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVE-2022-2572
https://notcve.org/view.php?id=CVE-2022-2572
01 Nov 2022 — In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked. En las versiones afectadas de Octopus Server donde el acceso es administrado por un proveedor de autenticación externo, era posible que la/las claves API de un usuario deshabilitado/eliminado aún fueran válidas después de que se revocara el acceso. • https://advisories.octopus.com/post/2022/sa2022-23 • CWE-287: Improper Authentication •