In Octopus Deploy before 4.1.3, the machine update process doesn't check that the user has access to all environments. This allows an access-control bypass because the set of environments to which a machine is scoped may include environments in which the user lacks access.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2017-12-13T20:00:00

Updated: 2024-08-05T20:59:17.205Z

Reserved: 2017-12-13T00:00:00

Link: CVE-2017-17665

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-12-13T20:29:00.300

Modified: 2024-11-21T03:18:25.570

Link: CVE-2017-17665

cve-icon Redhat

No data.