Vulnerability Description
In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Octopus | Octopus Deploy | >= 3.2.11, <= 4.1.5 |
Related Weaknesses (CWE)
References
- https://github.com/OctopusDeploy/Issues/issues/4134Issue TrackingThird Party Advisory
- https://github.com/OctopusDeploy/Issues/issues/4134Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-4862?
CVE-2018-4862 is a vulnerability with a CVSS score of 8.8 (HIGH). In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resu...
How severe is CVE-2018-4862?
CVE-2018-4862 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-4862?
Check the references section above for vendor advisories and patch information. Affected products include: Octopus Octopus Deploy.