Описание
In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backported to LTS 2019.9.8 and LTS 2019.6.14.)
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2019.10.7 (исключая)Версия от 2019.6.0 (включая) до 2019.6.14 (исключая)Версия от 2019.9.0 (включая) до 2019.9.8 (исключая)
Одно из
cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*
cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:lts:*:*:*
cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:lts:*:*:*
EPSS
Процентиль: 46%
0.00231
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backported to LTS 2019.9.8 and LTS 2019.6.14.)
EPSS
Процентиль: 46%
0.00231
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-20