First published: Fri Aug 23 2019(Updated: )
In Octopus Deploy versions 2018.8.4 to 2019.7.6, when a web request proxy is configured, an authenticated user (in certain limited special-characters circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.7. The fix was back-ported to LTS 2019.6.7 as well as LTS 2019.3.8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=2018.8.4<=2019.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15507 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2019-15507, upgrade to Octopus Deploy version 2019.7.7 or later.
The vulnerability in CVE-2019-15507 is triggered by certain limited special characters in the proxy password.
CVE-2019-15507 affects authenticated users of Octopus Deploy versions 2018.8.4 to 2019.7.6 configured with a web request proxy.
CVE-2019-15507 exposes the web request proxy password in cleartext in the deployment log.