cve-2022-1502
Vulnerability from cvelistv5
Published
2022-05-04 06:15
Modified
2024-08-03 00:03
Severity
Summary
Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions.
References
Source | URL | Tags |
---|---|---|
security@octopus.com | https://advisories.octopus.com/post/2022/sa2022-03/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product |
---|---|
Octopus Deploy | Octopus Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.octopus.com/post/2022/sa2022-03/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Octopus Server", "vendor": "Octopus Deploy", "versions": [ { "status": "affected", "version": "\u003c" } ] } ], "descriptions": [ { "lang": "en", "value": "Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Broken access control in API for projects using Git VCS in Octopus Server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-04T06:15:11", "orgId": "6f4f8c89-ef06-4bae-a2a5-6734ddf76272", "shortName": "Octopus" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.octopus.com/post/2022/sa2022-03/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@octopus.com", "ID": "CVE-2022-1502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Octopus Server", "version": { "version_data": [ { "version_affected": "2022.1.2454", "version_value": "\u003c" }, { "version_affected": "2021.3.12725", "version_value": "\u003c" } ] } } ] }, "vendor_name": "Octopus Deploy" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Broken access control in API for projects using Git VCS in Octopus Server" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.octopus.com/post/2022/sa2022-03/", "refsource": "MISC", "url": "https://advisories.octopus.com/post/2022/sa2022-03/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6f4f8c89-ef06-4bae-a2a5-6734ddf76272", "assignerShortName": "Octopus", "cveId": "CVE-2022-1502", "datePublished": "2022-05-04T06:15:11", "dateReserved": "2022-04-27T00:00:00", "dateUpdated": "2024-08-03T00:03:06.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-1502\",\"sourceIdentifier\":\"security@octopus.com\",\"published\":\"2022-05-04T07:15:07.210\",\"lastModified\":\"2023-08-08T14:22:24.967\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions.\"},{\"lang\":\"es\",\"value\":\"Los permisos no eran verificados apropiadamente en la API en los proyectos que usaban el control de versiones en Git. Esto permit\u00eda que los proyectos fuesen modificados por usuarios con permisos \u00fanicamente de ProjectView\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.5},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2021.3\",\"versionEndExcluding\":\"2021.3.12725\",\"matchCriteriaId\":\"206F9268-5A2A-43EC-8B14-D6C8DD62808D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2022.1\",\"versionEndExcluding\":\"2022.1.2454\",\"matchCriteriaId\":\"51B8A51F-F156-462E-ACAD-69B45934AF3D\"}]}]}],\"references\":[{\"url\":\"https://advisories.octopus.com/post/2022/sa2022-03/\",\"source\":\"security@octopus.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading...