In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
References
Link | Resource |
---|---|
https://advisories.octopus.com/post/2022/sa2022-20/ | Vendor Advisory |
https://advisories.octopus.com/post/2022/sa2022-20/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.octopus.com/post/2022/sa2022-20/ - Vendor Advisory |
19 Oct 2022, 14:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CWE | CWE-294 | |
References | (MISC) https://advisories.octopus.com/post/2022/sa2022-20/ - Vendor Advisory | |
CPE | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* |
14 Oct 2022, 12:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-14 07:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2780
Mitre link : CVE-2022-2780
CVE.ORG link : CVE-2022-2780
JSON object : View
Products Affected
octopus
- octopus_server
CWE
CWE-294
Authentication Bypass by Capture-replay