Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50693 | In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly. |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2024/sa2024-10/ |
|
Thu, 16 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Jan 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly. | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-01-16T14:21:30.387Z
Reserved: 2024-12-05T03:36:29.513Z
Link: CVE-2024-12226
Updated: 2025-01-16T14:21:24.664Z
Status : Deferred
Published: 2025-01-16T07:15:26.333
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-12226
No data.
OpenCVE Enrichment
No data.
EUVD