Octopus Deploy 信息泄露漏洞(CVE-2022-2258)
CVE编号
CVE-2022-2258利用情况
暂无补丁情况
N/A披露时间
2023-03-13漏洞描述
In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://advisories.octopus.com/post/2023/sa2023-03/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | octopus | octopus_server | * | From (including) 2019.1.0 | Up to (excluding) 2022.3.11098 | ||||
运行在以下环境 | |||||||||
应用 | octopus | octopus_server | * | From (including) 2022.4.791 | Up to (excluding) 2022.4.8463 | ||||
运行在以下环境 | |||||||||
应用 | octopus | octopus_server | * | From (including) 2023.1.4189 | Up to (excluding) 2023.1.9672 | ||||
运行在以下环境 | |||||||||
应用 | octopus | octopus_server | 2023.2.2028 | - | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | webkit2gtk3 | * | Up to (excluding) 2.34.6-1 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | webkit2gtk3-jsc-devel-debuginfo | * | Up to (excluding) 2.34.6-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35 | webkit2gtk3-debugsource | * | Up to (excluding) 2.34.5-1.fc35 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | libjavascriptcoregtk-4_0 | * | Up to (excluding) 2.34.6-29.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | libwebkit2gtk3-lang | * | Up to (excluding) 2.34.6-29.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 2.34.6-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | webkit2gtk3-jsc-devel-debuginfo | * | Up to (excluding) 2.34.6-1.el8 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | libjavascriptcoregtk-4_0 | * | Up to (excluding) 2.34.5-2.85.3 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 低
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-862 | 授权机制缺失 |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论