First published: Mon Mar 13 2023(Updated: )
In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=2019.1.0<2022.3.11098 | |
Octopus Deploy | >=2022.4.791<2022.4.8463 | |
Octopus Deploy | >=2023.1.4189<2023.1.9672 | |
Octopus Deploy | =2023.2.2028 | |
>=2019.1.0<2022.3.11098 | ||
>=2022.4.791<2022.4.8463 | ||
>=2023.1.4189<2023.1.9672 | ||
=2023.2.2028 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2258 has a medium severity rating due to the improper handling of permissions allowing unauthorized access to Tagsets.
To remediate CVE-2022-2258, update Octopus Deploy to a version beyond 2022.3.11098, 2022.4.791 through 2022.4.8463, or 2023.1.4189 through 2023.1.9672.
CVE-2022-2258 affects several versions of Octopus Deploy Server, including those from 2019.1.0 up to 2023.1.9672 and specific version 2023.2.2028.
Users of Octopus Deploy versions as specified in CVE-2022-2258 may be impacted if they have not been assigned permissions to view Tagsets.
There are currently no known workarounds for CVE-2022-2258; the only solution is to upgrade to a patched version.