First published: Thu Jul 25 2019(Updated: )
In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.3. The fix was back-ported to LTS 2019.6.5 as well as LTS 2019.3.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Octopus Deploy | >=3.0.19<=2019.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14268 refers to a vulnerability in Octopus Deploy versions 3.0.19 to 2019.7.2 where a web request proxy password could be logged in cleartext.
CVE-2019-14268 has a severity score of 6.5, which is considered medium.
To fix CVE-2019-14268, you need to update Octopus Deploy to version 2019.7.3 or later.
Octopus Deploy versions 3.0.19 to 2019.7.2 are affected by CVE-2019-14268.
Yes, you can find more information about CVE-2019-14268 at the following link: [GitHub Issue #5739](https://github.com/OctopusDeploy/Issues/issues/5739).