First published: Thu Oct 07 2021(Updated: )
When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=0.9<2020.4.229 | |
Octopus Deploy | >=2020.5.0<2020.5.256 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26556 is classified as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2021-26556, ensure that proper ACLs are set on the installation folders of Octopus Server.
CVE-2021-26556 affects users who have installed Octopus Server or Octopus Deploy in custom folder locations without the correct folder ACLs.
CVE-2021-26556 can enable DLL side-loading attacks allowing unprivileged users to execute malicious code with elevated privileges.
CVE-2021-26556 affects Octopus Deploy versions up to 2020.4.229 and Octopus Server versions between 2020.5.0 and 2020.5.256.