First published: Thu Nov 28 2019(Updated: )
In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backported to LTS 2019.9.8 and LTS 2019.6.14.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | <2019.10.7 | |
Octopus Deploy | >=2019.6.0<2019.6.14 | |
Octopus Deploy | >=2019.9.0<2019.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19376 has been classified as a denial of service vulnerability due to its impact on application availability.
To fix CVE-2019-19376, upgrade to Octopus Deploy version 2019.10.6 or later, or apply the backported fixes in LTS versions 2019.9.8 and 2019.6.14.
Authenticated users with TeamEdit permission in versions of Octopus Deploy prior to 2019.10.6, along with certain LTS versions, are affected by CVE-2019-19376.
CVE-2019-19376 is caused by a malformed Team API request that bypasses input validation, leading to application-level denial of service.
No, CVE-2019-19376 only affects specific versions of Octopus Deploy prior to 2019.10.6 and certain LTS versions.