First published: Fri Oct 14 2022(Updated: )
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=2021.2.994<2022.1.3180 | |
Octopus Deploy | >=2022.2.6729<2022.2.7965 | |
Octopus Deploy | >=2022.3.348<2022.3.10586 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2780 is classified as a high severity vulnerability due to its potential for NTLM relay attacks.
To fix CVE-2022-2780, upgrade to a version of Octopus Server that is not affected by this vulnerability.
CVE-2022-2780 affects Octopus Server versions between 2021.2.994 to 2022.1.3180, 2022.2.6729 to 2022.2.7965, and 2022.3.348 to 2022.3.10586.
CVE-2022-2780 can facilitate NTLM relay attacks through improper handling of SMB requests.
There are no known effective workarounds for CVE-2022-2780; upgrading is the recommended solution.