OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002.
References
Link | Resource |
---|---|
https://github.com/OctopusDeploy/OctopusDSC/releases/tag/v4.0.1002 | Release Notes Third Party Advisory |
https://github.com/OctopusDeploy/OctopusDSC/pull/270 | Patch Third Party Advisory |
https://github.com/OctopusDeploy/OctopusDSC/commit/24b448e6ac964ed938475add494a145c0473ac42 | Patch Third Party Advisory |
https://github.com/OctopusDeploy/OctopusDSC/security/advisories/GHSA-phmm-rfg9-94fm | Third Party Advisory |
Configurations
Information
Published : 2021-01-22 10:15
Updated : 2021-02-01 08:37
NVD link : CVE-2021-21270
Mitre link : CVE-2021-21270
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
octopus
- octopusdsc