Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42975 | In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2022-26/ |
|
Thu, 10 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-04-10T14:45:59.345Z
Reserved: 2022-10-19T00:00:00.000Z
Link: CVE-2022-3614
Updated: 2024-08-03T01:14:02.447Z
Status : Modified
Published: 2023-01-03T02:15:16.620
Modified: 2025-04-10T15:15:50.037
Link: CVE-2022-3614
No data.
OpenCVE Enrichment
No data.
EUVD