FKIE_CVE-2024-4226

Vulnerability from fkie_nvd - Published: 2024-04-30 02:15 - Updated: 2025-06-27 14:42
Summary
It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed.
Impacted products
Vendor Product Version
octopus octopus_server *
octopus octopus_server *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9391F226-6969-471F-8FC5-9D5B6FC08B79",
              "versionEndExcluding": "2022.2.7934",
              "versionStartIncluding": "2022.2.6729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D456CDD4-9135-40B7-A21E-106E452C1213",
              "versionEndExcluding": "2022.3.9163",
              "versionStartIncluding": "2022.3.348",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed."
    },
    {
      "lang": "es",
      "value": "Se identific\u00f3 que en ciertas versiones de Octopus Server, un usuario creado sin permisos pod\u00eda ver todos los usuarios, roles de usuario y permisos. Esta funcionalidad se elimin\u00f3 en las versiones de Octopus Server posteriores a las versiones corregidas enumeradas."
    }
  ],
  "id": "CVE-2024-4226",
  "lastModified": "2025-06-27T14:42:47.217",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 1.4,
        "source": "security@octopus.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-30T02:15:06.577",
  "references": [
    {
      "source": "security@octopus.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://advisories.octopus.com/post/2024/SA2024-03/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://advisories.octopus.com/post/2024/SA2024-03/"
    }
  ],
  "sourceIdentifier": "security@octopus.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…