First published: Fri Sep 30 2022(Updated: )
In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=3.0<2022.2.8277 | |
Octopus Deploy | >=2022.3.348<2022.3.10405 | |
Octopus Deploy | >=2022.4.791<2022.4.1371 | |
Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2778 has been classified with a severity level that allows for the bypass of rate limiting on login.
To fix CVE-2022-2778, it is recommended to update Octopus Deploy to the latest version that is not affected by this vulnerability.
CVE-2022-2778 affects Octopus Deploy versions between 3.0 and 2022.2.8277, 2022.3.348 and 2022.3.10405, and 2022.4.791 and 2022.4.1371.
An attacker exploiting CVE-2022-2778 can bypass rate limiting, potentially leading to repeated login attempts without restriction.
No, the Linux Kernel is not vulnerable to CVE-2022-2778.