FKIE_CVE-2022-1502
Vulnerability from fkie_nvd - Published: 2022-05-04 07:15 - Updated: 2024-11-21 06:40
Severity ?
Summary
Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions.
References
| URL | Tags | ||
|---|---|---|---|
| security@octopus.com | https://advisories.octopus.com/post/2022/sa2022-03/ | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://advisories.octopus.com/post/2022/sa2022-03/ | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "206F9268-5A2A-43EC-8B14-D6C8DD62808D",
"versionEndExcluding": "2021.3.12725",
"versionStartIncluding": "2021.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51B8A51F-F156-462E-ACAD-69B45934AF3D",
"versionEndExcluding": "2022.1.2454",
"versionStartIncluding": "2022.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permissions were not properly verified in the API on projects using version control in Git. This allowed projects to be modified by users with only ProjectView permissions."
},
{
"lang": "es",
"value": "Los permisos no eran verificados apropiadamente en la API en los proyectos que usaban el control de versiones en Git. Esto permit\u00eda que los proyectos fuesen modificados por usuarios con permisos \u00fanicamente de ProjectView"
}
],
"id": "CVE-2022-1502",
"lastModified": "2024-11-21T06:40:51.127",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-04T07:15:07.210",
"references": [
{
"source": "security@octopus.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://advisories.octopus.com/post/2022/sa2022-03/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://advisories.octopus.com/post/2022/sa2022-03/"
}
],
"sourceIdentifier": "security@octopus.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…