Permissions, Privileges, and Access Controls in Octopus Deploy - CVE-2019-15507
Published: August 30, 2019
Octopus Deploy
Detailed vulnerability description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to logging passwords in clear text under certain circumstances, when a web request proxy is configured. A remote authenticated user can trigger a deployment that writes the web request proxy password to the deployment log and use those credentials to gain unauthorized access to the deployment with elevated privileges.