First published: Thu May 18 2023(Updated: )
In affected versions of Octopus Deploy it is possible to discover network details via error message
Credit: security@octopus.com security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Deploy | >=3.0.0<2023.1.9879 | |
Octopus Deploy | >=2023.2.2028<2023.2.8159 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4870 is classified as moderate due to potential information disclosure risks.
To fix CVE-2022-4870, upgrade Octopus Deploy to a version beyond 2023.1.9879 or after 2023.2.2028.
CVE-2022-4870 can expose sensitive network configuration details through error messages.
CVE-2022-4870 affects Octopus Deploy versions from 3.0.0 up to 2023.1.9879 and from 2023.2.2028 to 2023.2.8159.
Yes, the information disclosure in CVE-2022-4870 could potentially lead to further attacks if network details are exploited.