First published: Tue Aug 25 2020(Updated: )
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Octopus Server | =3.4.0 | |
Octopus Server | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-16197 is rated as medium with a CVSS score of 4.3.
To fix the vulnerability in Octopus Deploy 3.4 related to CVE-2020-16197, apply the patches provided by Octopus Deploy or upgrade to a non-vulnerable version.
At this time, there are no known workarounds for the vulnerability in Octopus Deploy 3.4 related to CVE-2020-16197.