Improper Privilege Management in Octopus Deploy - CVE-2018-9039
Published: March 27, 2018 / Updated: July 17, 2020
Octopus Deploy
Detailed vulnerability description
The vulnerability allows a remote authenticated user to gain access to sensitive information.
In Octopus Deploy 2.0 and later before 2018.3.7, an authenticated user, with variable edit permissions, can scope some variables to targets greater than their permissions should allow. In other words, they can see machines beyond their team's scoped environments.