Improper Certificate Validation in Octopus Deploy - CVE-2020-16197
Published: August 25, 2020 / Updated: December 31, 2025
Octopus Deploy
Octopus Deploy
Description
The vulnerability allows a remote authenticated user to gain access to sensitive information.
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.