First published: Wed Sep 09 2020(Updated: )
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=2020.3<2020.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24566 has been classified as a high severity vulnerability due to the exposure of sensitive information.
To fix CVE-2020-24566, upgrade Octopus Deploy to version 2020.3.4 or later, or to version 2020.4.1 or later.
CVE-2020-24566 is an information exposure vulnerability that exposes account passwords under certain conditions.
Octopus Deploy versions 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1 are affected by CVE-2020-24566.
The vulnerability is exploited when an authenticated user creates a deployment or runbook process with Azure steps set to execute on the server/worker.