Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmmv-5xg4-p56f

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.

EPSS

Процентиль: 80%
0.01457
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.

EPSS

Процентиль: 80%
0.01457
Низкий