Total vulnerabilities in the database
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.
Software | From | Fixed in |
---|---|---|
octopus / server | 3.4.0 | 3.4.0.x |
octopus / octopus_server | 3.4.0 | 3.4.0.x |