Lucene search

K
OctopusOctopus Deploy

6 matches found

CVE
CVE
added 2018/01/03 9:29 a.m.42 views

CVE-2018-4862

In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.

8.8CVSS8.6AI score0.00192EPSS
CVE
CVE
added 2018/04/30 4:29 a.m.40 views

CVE-2018-10550

In Octopus Deploy before 2018.4.7, target and tenant tag variable scopes were not checked against the list of tenants the user has access to.

7.5CVSS7.5AI score0.00234EPSS
CVE
CVE
added 2018/05/01 1:29 p.m.37 views

CVE-2018-10581

In Octopus Deploy 3.4.x before 2018.4.7, an authenticated user is able to view/update/save variable values within the Tenant Variables area for Environments that do not exist within their associated Team scoping. This occurs in situations where this authenticated user also belongs to multiple teams...

5.5CVSS5.4AI score0.00227EPSS
CVE
CVE
added 2018/01/16 10:29 a.m.36 views

CVE-2018-5706

An issue was discovered in Octopus Deploy before 4.1.9. Any user with user editing permissions can modify teams to give themselves Administer System permissions even if they didn't have them, as demonstrated by use of the RoleEdit or TeamEdit permission.

8.8CVSS8.5AI score0.00207EPSS
CVE
CVE
added 2018/06/26 11:29 a.m.31 views

CVE-2018-12884

In Octopus Deploy 3.0 onwards (before 2018.6.7), an authenticated user with incorrect permissions may be able to create Accounts under the Infrastructure menu.

6.5CVSS6.2AI score0.00146EPSS
CVE
CVE
added 2018/03/27 3:29 a.m.28 views

CVE-2018-9039

In Octopus Deploy 2.0 and later before 2018.3.7, an authenticated user, with variable edit permissions, can scope some variables to targets greater than their permissions should allow. In other words, they can see machines beyond their team's scoped environments.

6.5CVSS6.3AI score0.00259EPSS