In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges.
References
Link | Resource |
---|---|
https://github.com/OctopusDeploy/Issues/issues/4134 | Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-01-03T09:00:00
Updated: 2018-01-03T08:57:01
Reserved: 2018-01-03T00:00:00
Link: CVE-2018-4862
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-01-03T09:29:00.190
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-4862
JSON object: View
Redhat Information
No data.
CWE