First published: Fri May 14 2021(Updated: )
Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | <2020.5.329 | |
Octopus Deploy | >=2020.6.0<2020.6.4847 | |
Octopus Deploy | >=2021.1.0<2021.1.6959 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30183 is rated as a high severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2021-30183, upgrade to Octopus Server version 2020.6.4848 or later, or version 2021.1.6960 or later.
CVE-2021-30183 affects multiple versions of Octopus Server from 2020.5.0 up to 2021.1.6959.
CVE-2021-30183 compromises sensitive information such as passwords by logging them in plaintext.
CVE-2021-30183 can be easily exploited if an attacker has access to the logs containing the plaintext passwords.