In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
References
Link Resource
https://github.com/OctopusDeploy/Issues/issues/5042 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-10-31T03:00:00

Updated: 2018-10-31T03:57:01

Reserved: 2018-10-30T00:00:00


Link: CVE-2018-18850

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-10-31T03:29:00.207

Modified: 2022-07-27T16:40:50.867


Link: CVE-2018-18850

JSON object: View

cve-icon Redhat Information

No data.