Analysis and contextual insights are available on OpenCVE Cloud.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
No data.
No data available yet.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-2977 | In Octopus Deploy 3.x before 3.15.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted NuGet package, potentially overwriting other packages or modifying system files. This is a directory traversal in the PackageId value. |
No CVSS v4.0
No CVSS v3.1
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
User Interaction Required
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact Complete
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00626.
Key SSVC decision points have not yet been added.
| Link | Providers |
|---|---|
| https://github.com/OctopusDeploy/Issues/issues/3654 |
|
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:05:30.788Z
Reserved: 2017-07-16T00:00:00.000Z
Link: CVE-2017-11348
No data.
Status : Modified
Published: 2017-07-17T13:18:21.203
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-11348
No data.
OpenCVE Enrichment
No data.
EUVD