Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34825 | In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked. |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2022-23/ |
|
Tue, 06 May 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-05-06T03:37:49.070Z
Reserved: 2022-07-29T00:00:00.000Z
Link: CVE-2022-2572
Updated: 2024-08-03T00:39:08.148Z
Status : Modified
Published: 2022-11-01T02:15:10.023
Modified: 2025-05-06T04:15:56.157
Link: CVE-2022-2572
No data.
OpenCVE Enrichment
No data.
EUVD