SB2020091112 - Inclusion of Sensitive Information in Log Files in Octopus Deploy



SB2020091112 - Inclusion of Sensitive Information in Log Files in Octopus Deploy

Published: September 11, 2020

Security Bulletin ID SB2020091112
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2020-24566)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.


Remediation

Install update from vendor's website.