First published: Tue Nov 01 2022(Updated: )
In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=3.5<2022.1.3264 | |
Octopus Deploy | >=2022.2.6729<2022.2.8277 | |
Octopus Deploy | >=2022.3.348<2022.3.10586 | |
Octopus Deploy | >=2022.4.791<2022.4.2898 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2572 is considered a medium-severity vulnerability as it allows API keys of disabled or deleted users to remain valid.
To fix CVE-2022-2572, update Octopus Server to a version that addresses this issue, specifically versions after 2022.4.791.
CVE-2022-2572 affects Octopus Server versions from 3.5 up to 2022.4.791.
The risks of CVE-2022-2572 include unauthorized access if API keys of disabled or deleted users remain operational.
CVE-2022-2572 impacts organizations using Octopus Server with external authentication providers that enable automated key management.