First published: Fri Aug 23 2019(Updated: )
In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 5.0.1. The fix was back-ported to 4.0.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=3.0.8<=2019.7.6 | |
Octopus Tentacle | >=3.0.8<=5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15508 is considered a medium severity vulnerability due to the exposure of sensitive information.
To fix CVE-2019-15508, upgrade Octopus Tentacle or Octopus Server to version 5.0.1 or later.
CVE-2019-15508 affects Octopus Tentacle versions between 3.0.8 and 5.0.0 and Octopus Server versions between 3.0.8 and 2019.7.6.
CVE-2019-15508 exposes the web request proxy password in cleartext in the deployment log.
Users of Octopus Tentacle and Octopus Server versions specified are impacted if the web request proxy is configured.