CVE-2018-18850
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
En Octopus Deploy, de la versión 2018.8.0 a las 2018.9.x anteriores a la 2018.9.1, un usuario autenticado con permisos para modificar los procesos de implementación podría subir una configuración YAML maliciosamente manipulada. Esto podría permitir la ejecución remota de código arbitrario, ejecutándose en el mismo contexto que el servidor Octopus (para las instalaciones autoalojadas por defecto, SYSTEM).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-10-30 CVE Reserved
- 2018-10-31 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/OctopusDeploy/Issues/issues/5042 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Octopus Search vendor "Octopus" | Octopus Server Search vendor "Octopus" for product "Octopus Server" | >= 2018.8.0 <= 2018.8.12 Search vendor "Octopus" for product "Octopus Server" and version " >= 2018.8.0 <= 2018.8.12" | - |
Affected
| ||||||
Octopus Search vendor "Octopus" | Octopus Server Search vendor "Octopus" for product "Octopus Server" | >= 2018.9.0 < 2018.9.1 Search vendor "Octopus" for product "Octopus Server" and version " >= 2018.9.0 < 2018.9.1" | - |
Affected
|