Vulnerability Description
In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 5.0.1. The fix was back-ported to 4.0.7.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Octopus | Server | >= 3.0.8, <= 2019.7.6 |
| Octopus | Tentacle | >= 3.0.8, <= 5.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/OctopusDeploy/Issues/issues/5750Issue TrackingThird Party Advisory
- https://github.com/OctopusDeploy/Issues/issues/5750Issue TrackingThird Party Advisory
FAQ
What is CVE-2019-15508?
CVE-2019-15508 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writ...
How severe is CVE-2019-15508?
CVE-2019-15508 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15508?
Check the references section above for vendor advisories and patch information. Affected products include: Octopus Server, Octopus Tentacle.