Описание
In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.
Ссылки
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.2.11 (включая) до 4.1.5 (включая)
cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*
EPSS
Процентиль: 41%
0.00192
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-269
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.
EPSS
Процентиль: 41%
0.00192
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-269