Overview
- Description
- In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 5.0.1. The fix was back-ported to 4.0.7.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-312
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A4E0CD9-F285-47B0-9CAF-426FAE6570CF", "versionEndIncluding": "2019.7.6", "versionStartIncluding": "3.0.8" }, { "criteria": "cpe:2.3:a:octopus:tentacle:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76D1B1C1-817F-4F76-9848-0DA549D1AA37", "versionEndIncluding": "5.0.0", "versionStartIncluding": "3.0.8" } ], "operator": "OR" } ] } ]