Description
In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-16648 | In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges. |
References
| Link | Providers |
|---|---|
| https://github.com/OctopusDeploy/Issues/issues/4134 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:18:26.471Z
Reserved: 2018-01-03T00:00:00.000Z
Link: CVE-2018-4862
No data.
Status : Modified
Published: 2018-01-03T09:29:00.190
Modified: 2024-11-21T04:07:36.463
Link: CVE-2018-4862
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD