Show filters
100 Total Results
Displaying 1-10 of 100
Sort by:
Attacker Value
Unknown
CVE-2025-0588
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated.
0
Attacker Value
Unknown
CVE-2025-0526
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
0
Attacker Value
Unknown
CVE-2025-0513
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message.
0
Attacker Value
Unknown
CVE-2025-0525
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server.
0
Attacker Value
Unknown
CVE-2025-0589
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself.
0
Attacker Value
Unknown
CVE-2024-12226
Disclosure Date: January 16, 2025 (last updated January 16, 2025)
In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly.
0
Attacker Value
Unknown
CVE-2024-1656
Disclosure Date: September 11, 2024 (last updated September 11, 2024)
Affected versions of Octopus Server had a weak content security policy.
0
Attacker Value
Unknown
CVE-2024-7998
Disclosure Date: August 21, 2024 (last updated August 21, 2024)
In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan.
0
Attacker Value
Unknown
CVE-2024-6972
Disclosure Date: July 25, 2024 (last updated July 25, 2024)
In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text.
0
Attacker Value
Unknown
CVE-2024-4811
Disclosure Date: July 25, 2024 (last updated July 25, 2024)
In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.
0