In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.
References
Link | Resource |
---|---|
https://advisories.octopus.com/post/2022/sa2022-26/ | Vendor Advisory |
https://advisories.octopus.com/post/2022/sa2022-26/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-288 |
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.octopus.com/post/2022/sa2022-26/ - Vendor Advisory | |
Summary |
|
23 Mar 2023, 17:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Octopus octopus Server
|
|
CPE | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* |
Information
Published : 2023-01-03 02:15
Updated : 2025-04-10 15:15
NVD link : CVE-2022-3614
Mitre link : CVE-2022-3614
CVE.ORG link : CVE-2022-3614
JSON object : View
Products Affected
octopus
- octopus_server