First published: Fri Nov 25 2022(Updated: )
In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=2022.2.6729<2022.2.7965 | |
Octopus Deploy | >=2022.3.348<2022.3.9163 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2721 has been classified with a medium severity level due to the potential exposure of sensitive information through log files.
To fix CVE-2022-2721, you should upgrade to Octopus Server version 2022.2.7966 or later, or 2022.3.9164 or later.
CVE-2022-2721 affects Octopus Server versions from 2022.2.6729 to 2022.2.7965 and 2022.3.348 to 2022.3.9163.
CVE-2022-2721 may expose sensitive values logged in plaintext when verbose logging is enabled during target discovery.
To prevent data exposure in logs related to CVE-2022-2721, avoid enabling verbose logging unless necessary and ensure you are on the latest version of Octopus Server.