First published: Thu Jul 08 2021(Updated: )
When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | <2020.6.5146 | |
Octopus Deploy | >=2021.1.0<2021.1.7316 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31816 is a vulnerability that occurs when configuring Octopus Server with an external SQL database, where the database password is written to the log file in plaintext.
CVE-2021-31816 affects Octopus Server versions up to 2021.1.7316, when it is configured with an external SQL database.
CVE-2021-31816 has a severity rating of 7.5, which is classified as high.
The Common Weakness Enumeration (CWE) for CVE-2021-31816 is CWE-312.
To fix CVE-2021-31816, it is recommended to upgrade Octopus Server to a version higher than 2021.1.7316 or apply the necessary security patches provided by the vendor.